How to Combat and Recover From APTs

By Karen A. Frenkel  |  Posted 02-16-2016 Email

In 1983, Fred Cohen, then a computer science student at the University of Southern California, demonstrated that no algorithm could perfectly detect all possible viruses and their variants. He published his findings in 1987 in ACM's journal, Computers and Security, in an article titled "Computer Viruses: Theory and Experiments." His work was the precursor to Advanced Persistent Threats (APTs). Rather than target a mass audience, APTs zero in on specific individuals, who, if compromised, can be used to advance the goal of the attack. Hackers use someone's alma mater, or a past job, for example, to key the email around. The main objective is to gain access to low-priority areas that companies have failed to protect adequately. By being patient, hackers gradually work their way into higher value segments of the network where important data resides. Cyber-security solutions company Comodo offers 10 tips for system administrations and IT directors to use a multilayered approach to combat and recover from ATPs.

Karen A. Frenkel writes about technology and innovation and lives in New York City.


Submit a Comment

Loading Comments...
Manage your Newsletters: Login Register