Preview

Theories for Combating the Advanced Persistant Threat

Good Essays
Open Document
Open Document
7229 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Theories for Combating the Advanced Persistant Threat
Todd Meedel

Det 630

New Cyber Policies For Combating the Advanced Persistent Threats

When we stand back and look at the various cyber threats that are currently being employed in the world, and attempt to prioritize those threats, you will quickly see that the most serious threat seems to emanate from a family of viruses called Advanced Persistent Threat; it is this virus type which seems to poses the greatest risk towards the United State. This is the type of threat that is currently being used against the United States by hostile governments around the world. However this is also the class of virus that it being used by the United States to conduct cyber operations against nations that pose a threat to the United States or its allies.

You may ask yourself, what is the Advance Persistent Threat (APT)? According to the website Dambella the APT is defined as “a cybercrime category of malware that is directed at business and political targets. APTs require a high degree of stealithiness over a prolonged duration of operation in order to be successful. The attack objectives therefore typically extend beyond immediate financial gain, and compromised systems continue to be of service even after key systems have been breached and initial goals reached.”

Advanced – what does the term advanced mean? The Merriam-Webster dictionary defines Advanced as “greatly developed beyond an initial stage”. In the world of cybercrime and cyber warfare this can only mean that those people who are initiating attacks are doing so by using methodologies and techniques that use the entire range of intrusion tools. Often the Advanced portion of the APT finds the attackers using multiple simple exploits simultaneously in a tiered attack. Thus allows for a multiple layered attack using multiple threat vectors to attack a single target, while using different technologies to achieve a common goal.

Persistent - Looking at the Merriam-Webster dictionary we can see that

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    References: Brenner, Joel (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. New York: The Penguin Press…

    • 4009 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit VIII, Question 11

    • 444 Words
    • 2 Pages

    Cyber crime is a major concern facing the general public today, due to the fact that you have a lot of people trying to infiltrate the government, the high increase on identity theft online and the high increase on credit card scam. For example, if military personnel leave there Common Access Card (CAC) card in their computers and a criminal steal the card give them access to lots of government document. Those issue requiring law makers and law enforcement agencies to take action throughout our nation. I think everyone should be aware of cyber threats and the actions they can take to protect their own information. The President recently…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Target's Attack Model

    • 607 Words
    • 3 Pages

    1. Does Target story follow the general “APT kill chain” attack model? Target’s story follows the general advanced persistent threat attack model. The hackers did the reconnaissance work by finding out Target’s external vendors. Unfortunately, this was easy for the hackers, because Target’s supplier portal and facilities management pages were publicly available information. So, the hackers target Fazio, an external vendor Target used. The hackers then created a targeted “weapon,,” in this case, malware, and sent phishing emails to people at Fazio. Fazio unfortunately did not use from anti-malware software. The hackers gained access to all of Fazio’s usernames and passwords, which allowed access to Target’s systems. The hackers exploited a…

    • 607 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The most prominent threat in contemporary society is the effects of the War of Terror, such as 9/11 and the influences of Islamic State of Iraq and Syria, or ISIS. However, there is an emerging terrorism threat to the United States that President Obama had to start dealing with. This is the threat of domestic cyber-security not being maintained and sustained. President Obama once gave a speech at the 2015 Cyber-security and Consumer Protection Summit in Stanford California’s honored university.…

    • 474 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Cyber security became ever more crucial for global business and modern society. We are living in a data-centric world in which information technology and associated communications ' systems as well as networks that provide goods and services permeate every facet of our lives. This creates the safeguard of our digital assets and activities within cyberspace of critical importance, whether for individual life experience or a prosperous and sustainable society. But the challenge to understand cyber risk and deliver effective and accessible security becomes harder as technology continues to rapidly evolve and our systems become ever more complex. We are increasingly dependent upon such information and communications infrastructures, and the threats we face are organised and evolving the skills to exploit our dependency to further their interests.…

    • 3699 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    Over the past couple of decades America has been fighting against the growing threat of terrorism. As the new millennium unravels, the age of the computer dawns the terrorists are beginning to fight on a different mainframe: the computer. The latest threat to U.S. intelligence is not terrorist attacks anymore, but cyber terrorism. As your Special Advisor on cyber security and cyber terrorism, I can prevent terrorist from all over the world from causing damage to our country.…

    • 613 Words
    • 3 Pages
    Best Essays
  • Satisfactory Essays

    Anytime you assess threats against the United States, it will become overwhelming, and the first thoughts are to impose a defensive measure. We must first learn how to separate and prioritize each threat. To do this we need to understand the risk assessment formula.…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    “The main reason for this controversy is that cyber-threats have not materialized as a national security threat, even granted that there have been some few incidents with at least some potential for grave consequences. Interestingly enough, both hypers and de-hypers tend to agree on this point. But while the first group assumes that vicious attacks that wreak havoc and paralyze whole nations are imminent, more cautious researchers often point to the practical difficulties of a serious cyberattack (Ingles-le Nobel,…

    • 677 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    In my opinion the most pertinent Non-traditional threat to the US is the economy. It is the single most important, globalized, and un-accounted for problem in the US. The current problem is so bad that the US economy is days away from a (partial) default. This would be the first default since possibly the 1700’s at the founding of the nation. The problem with this is the US green back is the reserve currency of the world (all or most investments are made in US dollars). If the US defaults it will cause a ripple effect that will make the 2008 global financial crisis look small in comparison to the global catastrophe that will occur. The reason most investments are in US dollars is because dollars have historically been the most stable currency in the modern age.…

    • 592 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    References: Army, U. (2005). Cyber Operations and Cyber Terrorism. In U. Army, U.S. Army Training…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    In this essay I will tell you why the United States spends so much on defense. I will explain three different reasons why the U.S.A spends so much on defense. The three topic why I chose why the U.S.A spends so much on defense were National Security, The Military, and the President. I will explain in each part that I choose why they spent so much on each one.…

    • 738 Words
    • 3 Pages
    Good Essays