1.Define what an Advanced Persistent Threat(APT) is. Advanced - far on or ahead in development or progress Persistent - continuing firmly in course of action in spite of difficulty or opposition Threat - a thing likely to cause damage or danger. Now let us put all of the above meanings and the process together. APT is a continuous computer hacking processes in spite of difficulty or opposition, done by humans for business or political motives which is ahead in development and progress to cause damage or danger. 2.How might an APT be used in a Cyber War to inflict damage on Industrial Control Systems? Background Industrial Control Systems - Control systems used inindustrial production Cyber War - The use of computer technology to disrupt the activities of communication systems APT can be started with a simple USB stick getting inserted into a machine which is connected to LAN of the systems which is targetted to damage. With continuous hacking, can get into the control systems and get the control over them to destroy. 3.Provide an example of an APT being used to cause damage to an Industrial Control System Stuxnet Solution 1.Define what an Advanced Persistent Threat(APT) is. Advanced - far on or ahead in development or progress Persistent - continuing firmly in course of action in spite of difficulty or opposition Threat - a thing likely to cause damage or danger. Now let us put all of the above meanings and the process together. APT is a continuous computer hacking processes in spite of difficulty or opposition, done by humans for business or political motives which is ahead in development and progress to cause damage or danger. 2.How might an APT be used in a Cyber War to inflict damage on Industrial Control Systems? Background Industrial Control Systems - Control systems used inindustrial production Cyber War - The use of computer technology to disrupt the activities of communication systems APT can be started with a simple USB stick getting inserted into a machine which is connected to LAN of the systems which is targetted to damage. With continuous hacking, can get into the control systems and get the control over them to destroy. 3.Provide an example of an APT being used to cause damage to an Industrial Control System Stuxnet.