Evaluate the evolution of cyber-related capabilities and technologies in warfare since 1998. Be sure to reference academic or scholarly research to support your findings.
Explain the characteristics of an APT, including specific examples of the tradecraft commonly used by an APT to accomplish its intended goals.
Explain how the characteristics of a current APT are different than the threats or attacks that would have been attempted before the prevalence of the Internet.
Describe where on the network the attack likely originated. Provide examples of common vulnerabilities and exposures (CVE) to support your claims.