Week 8 - Advanced Persistent Threats Flashcards
1
Q
What is APT?
A
- Advanced Persistent Threat.
- well funded and long term cyber attacks against specific organizations.
- often involving state-sponsored actors.
2
Q
What males APT concerning?
A
- it is stealthy, long-term, and often difficult to detect
- attack covers its tracks and blends in with legitimate traffic,
3
Q
What are the key stages of an APT attack?
A
- Reconnaissance – Gathering information about the system and targets.
- Initial Compromise – Gaining access through methods like phishing or malware.
- Lateral Movement – Expanding access within the system.
- Data Exfiltration – Extracting sensitive data.
- Maintenance and Concealment - maintain access to systems and conceal any evidence of compromise
4
Q
How do attackers gain initial access in an APT?
A
- social engineering techniques, such as phishing emails,
- exploiting vulnerabilities in software,
- taking advantage of weak password management.
5
Q
How to mitigate APTs?
A
- implementing principle of least privilege for access control.
- regular patch management to address vulnerabilities.
- Monitoring for abnormal behavior within the network.
- providing security awareness training to end users to prevent social engineering attacks.
- Traditional perimeter security expanded to consider outbound traffic
and internal network activity