Join Malcolm Shore for an in-depth discussion in this video Understanding advanced persistent threats (APTs), part of Foundations of Cybersecurity.
- View Offline
- Over recent years, there has been…an increasing recognition of the threat posed…by nation states, using highly sophisticated malware,…known as Advanced Persistent Threats, or APT's.…This is malware directed at political…and military targets, using multiple vectors to attack.…APT's have a high degree of stealthiness,…and can persist over a long period of time.…There are five key characteristics,…which make APT's quite different to root kits.…The first is that they tend to be highly customized,…to a specific target or set of targets,…rather than being a common code module.…
An associated characteristic is that they're focused…on targeting the specific system, or set of systems,…for which they've been designed,…rather than being opportunistic.…They usually have multiple advanced…and often zero-day exploits,…through which to exploit the target.…Their deployment is likely to be controlled,…or have some level of intervention by humans,…rather than being fully automated,…and once in place, operate in a low and slow manner,…
By the end of this course, you'll have a greater understanding of the threats that affect private, corporate, and government networks, and the knowledge to prevent attacks and defeat them.
- Dissecting cyber risk
- Working with NIST, COBIT 5, DSS05, and other frameworks
- Exploring cybercrime
- Understanding how malware hides
- Selecting security controls
- Managing user access and identity
- Monitoring your network
- Managing incident response