Week 8 - Advanced Persistent Threats Flashcards

1
Q

What is APT?

A
  • Advanced Persistent Threat.
  • well funded and long term cyber attacks against specific organizations.
  • often involving state-sponsored actors.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What males APT concerning?

A
  • it is stealthy, long-term, and often difficult to detect
  • attack covers its tracks and blends in with legitimate traffic,
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the key stages of an APT attack?

A
  • Reconnaissance – Gathering information about the system and targets.
  • Initial Compromise – Gaining access through methods like phishing or malware.
  • Lateral Movement – Expanding access within the system.
  • Data Exfiltration – Extracting sensitive data.
  • Maintenance and Concealment - maintain access to systems and conceal any evidence of compromise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do attackers gain initial access in an APT?

A
  • social engineering techniques, such as phishing emails,
  • exploiting vulnerabilities in software,
  • taking advantage of weak password management.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to mitigate APTs?

A
  • implementing principle of least privilege for access control.
  • regular patch management to address vulnerabilities.
  • Monitoring for abnormal behavior within the network.
  • providing security awareness training to end users to prevent social engineering attacks.
  • Traditional perimeter security expanded to consider outbound traffic
    and internal network activity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly