The global threat
States under threat of hostile agents.
The APT is based on a combination of elements that maximise the potential of the success of a cyber attack: analysis of open sources, surveillance, espionage, infiltration, cyber attack, exfiltration. AN APT that has been well executed works like a highly-sophisticated intelligence operation , with 5 clearly defined phases:
The APT combines human measures of conventional espionage, with IT resources so that purely technological security is not effective and the attacker includes social engineering actions and an advanced knowledge of languages. Often, businesses and organisations are attacked without being aware that their leading-edge technologies have been stolen and that they are losing their competitive advantage.