Activity Directions In this exercise, you will apply the analysis work you have

Activity Directions
In this exercise, you will apply the analysis work you have developed during previous modules; if necessary, develop realistic simulated IOC’s and TTP’s based on the organization you selected in Module 1, as well as material you have reviewed in previous modules. The goal of this exercise is for you to develop a realistic cyber threat intelligence report for a technical audience within your organization. This report should allow technical staff to take effective action and mitigate risk associated with cyber threat actors. 
Report Content
Your written report will be formal, with actionable mitigation recommendations for a technical audience (educated stakeholders) along with an executive summary. This report will provide a bottom line assessment of the actual, and future, impact to the organization from the activity of the cyber threat actors. Impact should be limited to no more than two pages. You will also provide a description of observed cyber threat actor activity and capabilities. This section should describe exploited vulnerabilities and techniques to subvert or overcome security controls. The report will outline recommended mitigation actions to restore the organization to an acceptable level of risk. The executive summary must be no more than one page. 
NOTE: This assignment has a longer page count requirement than other writing assignments you have completed in this course (see below).
Criteria and Requirements
Title page (Remember to use the provided template)
Length
Undergraduate: 10 full pages, double-spaced
References page (for papers with cited sources)
For a complete rubric, see below
The contents of your assignment will be automatically checked for plagiarism. Please see your syllabus for more information.
I have attached the template to get the report started.