Understanding Advanced Persistent Threats (APT)
📖 Scenario: You are part of a cybersecurity team tasked with identifying and understanding Advanced Persistent Threats (APT) in your organization's network logs. You will create a simple data structure to represent detected threats, configure a severity threshold, filter threats based on this threshold, and finally mark the critical threats for immediate action.
🎯 Goal: Build a step-by-step representation of APT detection by creating a dictionary of threats with their severity scores, setting a severity threshold, filtering threats above this threshold, and marking critical threats for response.
📋 What You'll Learn
Create a dictionary named
threats with exact threat names and severity scoresCreate a variable named
severity_threshold with the value 7Use a dictionary comprehension named
critical_threats to filter threats with severity above severity_thresholdAdd a key
'action' with value 'immediate response' to each threat in critical_threats💡 Why This Matters
🌍 Real World
Cybersecurity analysts use threat severity data to prioritize responses to Advanced Persistent Threats in real networks.
💼 Career
Understanding how to organize and filter threat data is essential for roles in cybersecurity monitoring, incident response, and threat intelligence.
Progress0 / 4 steps