Please choose one of the following threat actors for this (choose A or B): A) OilRigB) OCEANLOTUSslide deck addressing five key areas for chosen threat actor: 1) Hackers are not all the same; they range in skill, resources, and capability and often go bydifferent names. How would you classify this threat actor? Do they go by any aliases? Where are they from? How would you rate the sk
...[Show More]
Please choose one of the following threat actors for this (choose A or B):
A) OilRig
B) OCEANLOTUS
slide deck addressing five key areas for chosen threat actor:
1) Hackers are not all the same; they range in skill, resources, and capability and often go by
different names. How would you classify this threat actor? Do they go by any aliases? Where are they from? How would you rate the skill level and resources available to this threat actor?
2) Hackers are motivated to act for specific reasons. What are the motivations of your threat actor?
What is the specific geo-political context they are operating in and what insight does that give you for why they are operating in this manner?
3) Hackers utilize specific tradecraft, tactics, and processes to act on their motivations.
Describe the range of efforts used by your threat actor to engage in the hacking process. Utilize the Lockheed Martin Kill Chain to help describe those efforts.
4) Hackers utilize the hacking process to achieve certain "end-effects" on their target. Provide
examples or case studies of attacks your threat actor has been involved with over the years and describe their primary, secondary, and second order effects.
5) Not all hackers represent a strategic problem for policy makers. How would you characterize
your threat actor, are they chiefly a private problem for businesses or a public concern for policy makers? How should policy makers respond?
[Show Less]