Recent research on advanced persistent threats (APTs) has focused on development of tools, tactics, and procedures (TTP). However, developing an understanding of the managing bodies and bureaucracies that drive these actors and their computer network operations (CNOs) is just as significant as understanding their TTP.
Sara Mitchell shares a model that attempts to explain the optimal resource allocation of APTs and targets based on the feedback loops present in system dynamics. The assumption is that in this allocation there is an optimal way to operate to either attack or defend infrastructure.
Sara Mitchell is a recent graduate in security from Carnegie Mellon University, where her research focused on the role of modeling and simulation in threat intelligence.
©2017, O'Reilly Media, Inc. • (800) 889-8969 or (707) 827-7019 • Monday-Friday 7:30am-5pm PT • All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners. • email@example.com