Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.

Well done!

You have completed (UPI) Chapter 6: Types of Cybersecurity Threats!

Instruction

6.4.3. Scoring Procedure

We collected almost 150 reports analyzing attacks and websites using links from the APT Group list . We searched each paper for cyber-attack techniques using the keyword-base addressed in Section 3 (Offensive Cybersecurity elements). Finally, we calculated the cyber-attack score based on the offensive cybersecurity elements. Figure 3 and Algorithm 1 show the overall scoring procedure. Additiona...