A-Z Popular Blog Security Search »
Information Security
 Advertisements
Related Guides

What is an Advanced Persistent Threat?

 , updated on
An advanced persistent threat is a type of information security threat that involves sophisticated levels of expertise and capabilities that allow an attack to be escalated using multiple attack vectors. The term is associated with direct human involvement in an attack. Advanced persistent threats tend to play out over time beginning with an initial foothold that is used to discover vulnerabilities, deploy tools, escalate privileges and expand presence. An attacker may cover their tracks so as to remain undetected for long periods of time.
Overview: Advanced Persistent Threat
Type
Information Security Threat
Definition
An information security threat that uses sophisticated levels of expertise and capabilities to expand an attack over a period of time using multiple attack vectors.
Related Concepts

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
Incident Response
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.

Types of Technology

A reasonably comprehensive list of information technologies.

Gamification

A list of gamification techniques.

Information Technology Problems

A list of common IT problems.

Types Of Cloud

The basic types of cloud computing.

Machine Data

The common types of machine data.

Types Of Software

The common types of software.

Proprietary Technology

A definition of proprietary technology with examples.

Systems Design

The common elements of a systems design.

Systems vs Applications

The difference between systems and applications explained.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map