Abstract

: The paper presents an overview of Advanced Persistent Threats (APTs), and its core concepts, life cycle and characteristic features. In addition, the key factors; actors, targets and motives of an APT were highlighted in detail. The critical challenges currently facing organizations due to APT attacks on its systems, networks and IT infrastructure were critically examined. Lastly, the potential strategies for mitigating APTs were identified and highlighted. The findings demonstrated that an APT is a series of long term, covert and persistent cyber threats that target, penetrate and exploit organizations, businesses or states to acquire valuable proprietary (industrial espionage) data or political reasons (activism) resulting in losses of over USD$500 Billion annually. Consequently, the prevalence and sophistication of APTs have soared astronomically accounting for 39% of all cyber-attacks on computer networks. Furthermore, the potential damage from APTs is responsible for 60-65% downtime, network disruption, and financial losses. Hence, the potentially damaging effects of APTs, has prompted various organizations to invest in cyber security programs and other mitigation strategies to timely detect, prevent and eradicate future APT attacks. The paper reveals that APTs can be mitigated by deploying computer analytics, network security mechanisms such as the “defense in depth” (D-in-D), network traffic introspection, and endpoint security measures. However, other strategies include the deployment of Advanced Persistent Security measures. In conclusion, the paper reveal that APTs pose significant threats to global computer networks and require considerable resources, and investment to forestall future problems.

Highlights

  • The termAdvanced Persistent Threat (APT) typicallydescribes a series of highly organized and persistent attacks on computer networkscoordinated by hackers or cybercriminals to extract valuable information from organizations (Ask et al, 2013; Cobb, 2013; Kumar and Kumar, 2014)

  • The growing menace of APTs has become a source of concern for cyber security industry over the years. This isdue to its attendant risk to the integrity of computers, systems and networks around the globe(Arsene, 2017). This is because the growing sophistication, spate and prevalence of APTs present significant risks to businesses, national and global security.This is corroborated by Thummala (2016)whopositsno industry is immune to the sophisticated nature of advanced malware and zero-day exploits used for APT attacks

  • The paper presented an overview of current state ofAPTs, its core concept and characteristics

Read more

Summary

INTRODUCTION

The termAdvanced Persistent Threat (APT) typicallydescribes a series of highly organized and persistent attacks on computer networkscoordinated by hackers or cybercriminals to extract valuable information from organizations (Ask et al, 2013; Cobb, 2013; Kumar and Kumar, 2014). An APTis a generic term thatdescribes a series of long term, covert and persistentcyber threats targeted at organisations, states or businesses for the purpose of extracting valuable data for industrial espionage or political activism(Rudner, 2013; Lindsay, 2015).According to Friedberg et al (2015), an APT is deliberate slow-movingcyber-attack designed to secretly compromise the security of interconnected information systems with the objective to gain unauthorised access. Many observers opine that by the year 2020, the global cyber security budget of firms, organisations and states will soar by over 60% significantly bloating the cost of doing business This will require significant investment to comprehensively understand the modus operandi, detect intrusions and prevent damage by APTs toglobal computer systems and IT networks. The APT adapts to counter tools or cyber security measures(Fire Eye, 2017)

Actors in an APT
Motives of an APT
Targets of an APT
Attack Methods
Findings
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call