WikiSeguridad
In an APT attack, a threat actor uses the most sophisticated tactics and technologies to penetrate a high-profile network. APTs aim to stay ‘under the radar’ and explore the network while remaining undetected for weeks, months, and even years. APTs are most often used by nation-state threat actors wishing to cause severe disruption and damage to the economic and political stability of a country. They can be considered the cyber equivalent of espionage ‘sleeper cells’.
70 afleveringen
Reacties
0Wees de eerste die een reactie plaatst
Meld je nu aan en word lid van de WikiSeguridad community!