1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

5 tips for defending against advanced persistent threats

Discussion in 'Network World' started by RSS, Apr 26, 2016.

  1. RSS

    RSS New Member Member

    The aptly named advanced persistent threat (APT) is a type of network attack in which an attacker selects a specific target, uses social engineering and advanced technologies to break into a network and then focuses on that target for weeks, months or years until the attack has successfully played out (or been thwarted). Once inside a network, the attacker's goal is to remain undetected while using some type of malware to capture confidential information, which is ultimately sent to a different location for analysis and then sold on the black market.

    APTs are highly organized, sometimes with a complete staff, and have plenty of monetary and technological resources. Although APTs may use common hacker tools, they more often employ sophisticated, customized software that's less likely to be picked up by a security protection system. Types of APTs or delivery mechanisms include zero-day attacks, phishing, advanced malware and a variety of Web compromises.

    To read this article in full or to leave a comment, please click here

    (Insider Story)

    Continue reading...
     

Share This Page