Hide Folder Information Turnitin® Turnitin® enabledThis assignment will be submitted to Turnitin®. Instructions For this assignment, you must consider advanced cyberattacks from nation-states and cybercriminals, starting with SolarWinds and beyond. Devise approaches to discover stealth, hidden, and obfuscated attack vectors that can be hidden in regular data infrastructure, including servers, workstations, and the operating systems and applications within those devices. Justify the benefits of threat hunting within a cyber environment. Be sure your paper includes the following: A list of cyber forensic capabilities Attack vectors This assignment will be submitted to Turnitin®. Instructions This assignment is proposed to include a scenario. Example: International data criminals that might have nation-state ties infiltrate a significant government or enterprise data center. They succeed in acquiring intellectual property. The initial entry occurred a year ago because one discovers that a virus attack resulting from a bad link clicked by a senior employee was a diversion to establish a remote privileged login exempt from multifactor authentication. The organization includes excellent backup, archival of data, SIEM with events going back 15 months, proper collection of log activity, and the original machines are all available. Assess federal rules of evidence and procedure to guide the proposed conduct of a comprehensive cyber investigation. The objective is to take the scenario from initial outreach through the delivery of evidence in a court of law. Include all steps, including the protection and analysis of evidence, plus it is a presentation to the court for an investigation that exceeds one year. Specifically include the implications of delays and the need for credible presentation and what you would specify to improve the probability of success.