Identify your threat actors and characterize their motivations or desired outcomes. Use research from the Project Three resource guide orDescribe at least one tactic or method that is important in responding to and countering this threat actor. Use research from the Project Three

CYB-200-02: Develop reliable, ethical methods to detect, characterize, and counter cyber threat actors

In your technical brief, you must address the critical elements listed below. The codes shown in brackets indicate the course competency to which each critical

element is aligned.

I. Introduction

A. Identify your threat actors and characterize their motivations or desired outcomes. Use research from the Project Three resource guide or

decision aid to support your response. For example, is the threat actor gathering information for financial gain? [CYB-200-02]

II. Analysis

A. Describe best practices or methods for detecting the threat actors from the scenario. Use research from the Project Three resource guide or

decision aid to support your response. [CYB-200-02]

B. Describe ethical and legal factors that should be considered and their significance in terms of the company for which you are employed in the

scenario. Use research from the Project Three resource guide or decision aid to support your response. [CYB-200-02]

C. Describe at least one tactic or method that is important in responding to and countering this threat actor. Use research from the Project Three

resource guide or decision aid to support your response. [CYB-200-02]

D. Describe at least one tactic or method that would be employed to reduce the likelihood of the same situation happening again. Use research

from the Project Three resource guide or decision aid to support your response. [CYB-200-02]

III. Conclusion

A. Explain the potential ramifications of the tactics or methods you have suggested. Use research from the resource guide or decision aid to

support your response. [CYB-200-02]