The type of data that is targeted for attacks varies by attacker and target, (financial gain, usernames/passwords, intellectual property, etc.)Įven though the motives and targets used by APTs can vary greatly, they often operate in stages that are common across attacks. They are generally intended for specific targets and designed to evade detection in order to steal data. These threats are targeted and as such do not have wide distribution on the Internet. The challenge of Advanced Persistent ThreatsĪdvanced persistent threats often use malware that is difficult to detect using traditional antivirus scanning and are designed specifically to run for long periods of time without being noticed. This paper provides guidelines on how to ensure that SEP protection technologies are enabled and functioning in order to provide best protection for endpoints. Symantec Endpoint Protection 12.1 (SEP 12.1) includes protection technologies that go beyond traditional antivirus scanning to provide effective protection of endpoints against the sophisticated malware used by APTs. Traditional antivirus signature-based scanning is reactive in that a signature can only be written to detect a threat that has already been seen. The effectiveness of traditional file-based antivirus scanning technology is not by itself sufficient protection because a given malware associated with an APT will have extremely low prevalence, that is, will not be widely seen on the Internet. These attacks are specifically targeted and are often carried out using sophisticated malware. Challenges related to advanced persistent threats include cyber attacks that are designed to do anything from steal sensitive data for financial gain, corporate espionage, etc., to sabotage of critical infrastructure. ![]() ![]() Advanced persistent threats (APTs) pose serious challenges for organizations of all sizes.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |