Advanced Persistent Threat 2013
DOI: 10.1016/b978-1-59-749949-1.00001-2
|View full text |Cite
|
Sign up to set email alerts
|

The Changing Threat

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0
2

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 0 publications
0
2
0
2
Order By: Relevance
“…Specifically, for periodic play, the faster-moving player can expect to remain in control of the resource for a longer time than the slower player. 11 Compared to exponential play, players are also less likely to flip a resource already in their control (sometimes called a "flop").…”
Section: Conflicts Of Interestmentioning
confidence: 99%
See 1 more Smart Citation
“…Specifically, for periodic play, the faster-moving player can expect to remain in control of the resource for a longer time than the slower player. 11 Compared to exponential play, players are also less likely to flip a resource already in their control (sometimes called a "flop").…”
Section: Conflicts Of Interestmentioning
confidence: 99%
“…FlipIt models capture scenarios taken in part from a series of high-profile (cyber) attacks against supposedly well-protected targets-the Iranian industrial control systems [4], the U.S. Office of Personnel Management [5,6], large telecommunication providers [7,8], major health care insurance companies [9], and, recently, critical infrastructure companies in Ukraine [10]. An essential property shared by these threats is that against them, perfectly effective preventative investments are nearly impossible [11,12]. Mitigation strategies such as in-depth security audits or longer-term investments to reorganize existing IT infrastructures are therefore weighed against the economic incentives of would-be attackers.…”
Section: Introductionmentioning
confidence: 99%
“…Una APT, a veces, está patrocinados por el Gobierno con fines de cuidarse política y económicamente [1] y pueda que el ataque no sea de por sí avanzado o sofisticado, puede simplemente aprovechar debilidades y errores en la estructura informática y de información de la víctima con el fin de robar datos (especialmente propiedad intelectual). De hecho, el término "sofisticado" se acomoda más al atacante que ya está más estructurado y es más organizado en sus ejecuciones [19].…”
Section: Amenazas Persistentes Avanzadas (Apt) 11 Definiciónunclassified
“…• El atacante está enfocado en todos los activos que son importantes para la organización, especialmente, los datos [19].…”
Section: Características De Las Aptunclassified