This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 45 lines
!!! Overview
[{$pagename}] ([APT]) is a set of stealthy and continuous computer [attack] processes, often orchestrated by a [Bad Actor] or [Bad Actors] targeting a specific [entity] or [Target Resource].
[{$pagename}] usually targets either private [organizational Entity], [Government Entity] or both for business or political motives.
[{$pagename}] typically processes require a high degree of covertness over a long period of time. The "advanced" process signifies sophisticated techniques using [malware] to [exploit] [vulnerabilities|Vulnerability] in systems. The "persistent" process suggests that an external command and control system is continuously [monitoring] and extracting [data] from a specific [Item of Interest]. The "threat" process indicates human involvement in orchestrating the [attack]
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Advanced Persistent Threat|Wikipedia:Advanced_persistent_threat|target='_blank']