Read the following article on Scalable Methods for Conducting Cyber Threat Hunt Operations. Write a 3-page paper, make sure your submissions areoriginal work with cited sources and make sure your paraphrase your sources along with proper APA formatting; Title page, Running, In Text Citations, Page Numbers, and Reference page.
You are to provide a critical analysis of this paper. Compare and contrast this authors methodology of:
- Create a Hypothesis
- Investigate via Tools and Techniques
- Uncover new Patters and Tactics, Techniques, and Procedures (TTPs)
- Informa and Enrich Analytics