These APTs are resourced unlike other types of cyber threat actors. Your Chief Technology Officer (CTO) has formed groups of 5 people with the intent she will receive a detailed analysis and presentation on each APT.
Advanced Persistent Threats APT Analysis Report Writing Guideline
As a group, you will complete a report that includes the following sections and information:
(1) Describe how machine learning and data analytics could have detected and/or prevented the APT you analyzed had the victim organization deployed these technologies at the time of the event. Be specific.
Use additional sources of information but also describe the concept in layman terms.
Use visuals where appropriate.
Please use attachment in “additional files” to answer the question and outside sources as necessary