Webopedia on Google+Webopedia on TwitterWebopedia on FacebookTech Bytes Blog
Main » TERM » A »

APT - advanced persistent threat

An advanced persistent threat (APT) is a  targeted attack by cyber criminals or in some cases government institutions that uses multiple phases to first stealthily penetrate a network while avoiding detection and then obtain valuable information over an extended period of time. Advanced persistent threats are highly complex threats that differ from traditional threats in that they are targeted, persistent, evasive and extremely advanced.

Penetrating the defenses of a specific organization or country and then stealing information from them without being detected requires enormous amounts of research and time, and the entire process of an advanced persistent threat may take months or even years to fully execute. Because of the scope of attack, as well as the costs and time involved, APTs are often initiated, either directly or indirectly, with the involvement of national or international government bodies.

One of the most well-known examples of an advanced persistent threat was Stuxnet, a malware worm created to disrupt Iran’s nuclear development efforts.







TECH RESOURCES FROM OUR PARTNERS
LATEST ARTICLES
Slideshow: 5 Hot Holiday Gifts for Tech Enthusiasts

From cute electronic toys to VR gaming, here are 5 hot gifts to give to your special tech enthusiast this holiday season. Read More »

What's Hot in Tech: AI Tops the List

Like everything in technology, AI touches on so many other trends, like self-driving cars and automation, and Big Data and the Internet of Things... Read More »

DevOp's Role in Application Security

As organizations rush to release new applications, security appears to be getting short shrift. DevSecOps is a new approach that holds promise. Read More »

STUDY GUIDES
Java Basics, Part 1

Java is a high-level programming language. This guide describes the basics of Java, providing an overview of syntax, variables, data types and... Read More »

Java Basics, Part 2

This second Study Guide describes the basics of Java, providing an overview of operators, modifiers and control Structures. Read More »

The 7 Layers of the OSI Model

The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More »