100% (1)
page:
2 pages/≈550 words
Sources:
-1
Style:
APA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

Advanced Persistent Threat Attacks

Essay Instructions:

Write a 2-page, double-spaced paper (500 to 575 words) in APA format focused on an example of an APT attack.

Instructions:

Research and identify an example of an APT attack.

What was the motivation for the attack?

What was gained (information, financial benefit, competitive edge, etc.)?

Analyze and explain the security mechanisms that could be put in place to reduce the success of an APT attack.

Finally, be sure to discuss whether you believe your workplace organization could have discovered the example APT before they were successful in exfiltrating data. Why or why not?

https://www(dot)csoonline(dot)com/article/3177438/security/profiling-10-types-of-hackers.html

https://www(dot)csoonline(dot)com/article/2615666/security/security-5-signs-you-ve-been-hit-with-an-advanced-persistent-threat.html

https://www(dot)youtube(dot)com/watch?v=fpeMR1214t0

https://www(dot)youtube(dot)com/watch?v=cPTPpb8Ldz8

Essay Sample Content Preview:
Advanced Persistent Threat Attacks
Name
Institutional Affiliation
Advanced Persistent Threat Attacks
Prior to carrying out an APT attack, criminals conduct investigations to determine the vulnerabilities that they can exploit to their advantage. The primary focus of the criminals is gaining access to the victim’s system and conducting surveillance on them for a long time undetected. Due to the long duration of surveillance, the criminals can design custom malware for the victim. Financial gain and political espionage are the leading motivation factors for the attacks. The criminals’ main interest is to steal data and use it to their advantage. Initially, the APT attacks were used by nations for surveillance or to steal industrial secrets. However, the attacks are now used to steal data for direct financial gain. The 2010 Stuxnet Worm exemplifies an APT attack. The malware was designed to access Iran’s nuclear system.
The APT attack is believed to have been politically motivated. The secretive data obtained from the attack would help the criminals learn more about the Iranian industrial sector. Described as one of the most sophisticated malware, it was designed to attack Iran’s nuclear power. The complexity of the hacking process indicates that it must have been carried out by nation actors only as they possessed privileged information. One of the most unique aspects about the software was that it targeted computers that were operated offline for security reasons. Instead it infected the USB and spread to Windows, propagating through the systems with time.
The criminals s...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!