Professional Documents
Culture Documents
Presentation On Cybersecurity
Presentation On Cybersecurity
Presented by
Samira Shajahan Borsha
ID: 17-35761-3
Instructor
Dr. Afroza Nahar
Associate Professor
Department of Computer Science
List of Contents
Introduction
Characteristics of APT
Implementation of an APT
Final Thoughts
Introduction
• An APT is a calculated network attack on any organization. These threats
occur when a hacker, or group of hackers, establishes a foothold inside of an
enterprise network.
• APTs are unique in that they have certain goals and objectives.
• APTs go undetected for prolonged periods of time, allowing
for sensitive data to be mined.
Life Cycle of APT
• Stage 1: Targeting/Reconnaissance
• Stage 2: Entry
• Stage 3: Discovery
• Stage 4: Capture
• Objective driven
• Risk tolerance
the following: