SlideShare a Scribd company logo
1.Define what an Advanced Persistent Threat(APT) is.
Advanced - far on or ahead in development or progress
Persistent - continuing firmly in course of action in spite of difficulty or opposition
Threat - a thing likely to cause damage or danger.
Now let us put all of the above meanings and the process together.
APT is a continuous computer hacking processes in spite of difficulty or opposition, done by
humans for business or political motives which is ahead in development and progress to cause
damage or danger.
2.How might an APT be used in a Cyber War to inflict damage on Industrial Control Systems?
Background
Industrial Control Systems - Control systems used inindustrial production
Cyber War - The use of computer technology to disrupt the activities of communication systems
APT can be started with a simple USB stick getting inserted into a machine which is connected
to LAN of the systems which is targetted to damage. With continuous hacking, can get into the
control systems and get the control over them to destroy.
3.Provide an example of an APT being used to cause damage to an Industrial Control System
Stuxnet
Solution
1.Define what an Advanced Persistent Threat(APT) is.
Advanced - far on or ahead in development or progress
Persistent - continuing firmly in course of action in spite of difficulty or opposition
Threat - a thing likely to cause damage or danger.
Now let us put all of the above meanings and the process together.
APT is a continuous computer hacking processes in spite of difficulty or opposition, done by
humans for business or political motives which is ahead in development and progress to cause
damage or danger.
2.How might an APT be used in a Cyber War to inflict damage on Industrial Control Systems?
Background
Industrial Control Systems - Control systems used inindustrial production
Cyber War - The use of computer technology to disrupt the activities of communication systems
APT can be started with a simple USB stick getting inserted into a machine which is connected
to LAN of the systems which is targetted to damage. With continuous hacking, can get into the
control systems and get the control over them to destroy.
3.Provide an example of an APT being used to cause damage to an Industrial Control System
Stuxnet

More Related Content

Similar to 1.Define what an Advanced Persistent Threat(APT) is.Advanced - far.pdf

Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityEditor IJMTER
 
How stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systemsHow stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systemsYury Chemerkin
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Lana Sorrels
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And RiskChandrashekhar B
 
The Art of Securing Systems: Exploring the World of VAPT
The Art of Securing Systems: Exploring the World of VAPTThe Art of Securing Systems: Exploring the World of VAPT
The Art of Securing Systems: Exploring the World of VAPTShyamMishra72
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and RiskSecPod Technologies
 
Cat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsCat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsSimeon Ogao
 
Review on Honeypot Security
Review on Honeypot SecurityReview on Honeypot Security
Review on Honeypot SecurityIRJET Journal
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxbartholomeocoombs
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxannette228280
 
ME Information Security
ME Information SecurityME Information Security
ME Information SecurityMohamed Monsef
 
IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber SecurityIRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber SecurityIRJET Journal
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”IRJET Journal
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Eng. Mohammed Ahmed Siddiqui
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionchristophefeltus
 

Similar to 1.Define what an Advanced Persistent Threat(APT) is.Advanced - far.pdf (20)

Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network Security
 
How stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systemsHow stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systems
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And Risk
 
The Art of Securing Systems: Exploring the World of VAPT
The Art of Securing Systems: Exploring the World of VAPTThe Art of Securing Systems: Exploring the World of VAPT
The Art of Securing Systems: Exploring the World of VAPT
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
 
NSAS: NETWORK SECURITY AWARENESS SYSTEM
NSAS: NETWORK SECURITY AWARENESS SYSTEMNSAS: NETWORK SECURITY AWARENESS SYSTEM
NSAS: NETWORK SECURITY AWARENESS SYSTEM
 
Cat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsCat21:Development Mangement Information Systems
Cat21:Development Mangement Information Systems
 
APT - Project
APT - Project APT - Project
APT - Project
 
Review on Honeypot Security
Review on Honeypot SecurityReview on Honeypot Security
Review on Honeypot Security
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
ME Information Security
ME Information SecurityME Information Security
ME Information Security
 
IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber SecurityIRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber Security
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
IJET-V3I2P16
IJET-V3I2P16IJET-V3I2P16
IJET-V3I2P16
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 

More from info430661

Yes, molality = moles of solute kg of solventSolutionYes, mo.pdf
Yes, molality = moles of solute  kg of solventSolutionYes, mo.pdfYes, molality = moles of solute  kg of solventSolutionYes, mo.pdf
Yes, molality = moles of solute kg of solventSolutionYes, mo.pdfinfo430661
 
When Laura left her job as a law firm manager to launch her own busi.pdf
When Laura left her job as a law firm manager to launch her own busi.pdfWhen Laura left her job as a law firm manager to launch her own busi.pdf
When Laura left her job as a law firm manager to launch her own busi.pdfinfo430661
 
WaterMolarity of pure water is 55.5 M. It is calculated as below..pdf
WaterMolarity of pure water is 55.5 M. It is calculated as below..pdfWaterMolarity of pure water is 55.5 M. It is calculated as below..pdf
WaterMolarity of pure water is 55.5 M. It is calculated as below..pdfinfo430661
 
The degree is 3 and the leading coefficient is -11.SolutionThe.pdf
The degree is 3 and the leading coefficient is -11.SolutionThe.pdfThe degree is 3 and the leading coefficient is -11.SolutionThe.pdf
The degree is 3 and the leading coefficient is -11.SolutionThe.pdfinfo430661
 
moles of HCl = 500.1 = 5 moles of NaOH = 20.50..pdf
                     moles of HCl = 500.1 = 5 moles of NaOH = 20.50..pdf                     moles of HCl = 500.1 = 5 moles of NaOH = 20.50..pdf
moles of HCl = 500.1 = 5 moles of NaOH = 20.50..pdfinfo430661
 
Kc = [H2][I2][HI]^2 Kc = 1.84 x 10^-2 .pdf
                     Kc = [H2][I2][HI]^2  Kc = 1.84 x 10^-2          .pdf                     Kc = [H2][I2][HI]^2  Kc = 1.84 x 10^-2          .pdf
Kc = [H2][I2][HI]^2 Kc = 1.84 x 10^-2 .pdfinfo430661
 
Ionic bond 1.The atoms are bound together by the.pdf
                     Ionic bond 1.The atoms are bound together by the.pdf                     Ionic bond 1.The atoms are bound together by the.pdf
Ionic bond 1.The atoms are bound together by the.pdfinfo430661
 
Importance of Phosphorylated Intermediates Each o.pdf
                     Importance of Phosphorylated Intermediates Each o.pdf                     Importance of Phosphorylated Intermediates Each o.pdf
Importance of Phosphorylated Intermediates Each o.pdfinfo430661
 
Solution of the Questions with ExplanationPart AThe Domain Name.pdf
Solution of the Questions with ExplanationPart AThe Domain Name.pdfSolution of the Questions with ExplanationPart AThe Domain Name.pdf
Solution of the Questions with ExplanationPart AThe Domain Name.pdfinfo430661
 
Sexual selection is a type of natural selection. Sexual selection ac.pdf
Sexual selection is a type of natural selection. Sexual selection ac.pdfSexual selection is a type of natural selection. Sexual selection ac.pdf
Sexual selection is a type of natural selection. Sexual selection ac.pdfinfo430661
 
PPSS x ppss is a dihybrid cross. P, p, S and s are alleles for corn .pdf
PPSS x ppss is a dihybrid cross. P, p, S and s are alleles for corn .pdfPPSS x ppss is a dihybrid cross. P, p, S and s are alleles for corn .pdf
PPSS x ppss is a dihybrid cross. P, p, S and s are alleles for corn .pdfinfo430661
 
package com.tictactoe; public class Main {public void play() {.pdf
package com.tictactoe; public class Main {public void play() {.pdfpackage com.tictactoe; public class Main {public void play() {.pdf
package com.tictactoe; public class Main {public void play() {.pdfinfo430661
 
d. tyrosine (it acts as a nucleophile) .pdf
                     d. tyrosine (it acts as a nucleophile)           .pdf                     d. tyrosine (it acts as a nucleophile)           .pdf
d. tyrosine (it acts as a nucleophile) .pdfinfo430661
 
ORSolutionOR.pdf
ORSolutionOR.pdfORSolutionOR.pdf
ORSolutionOR.pdfinfo430661
 
It also leads to the loss of the privacy of the individual. If it is.pdf
It also leads to the loss of the privacy of the individual. If it is.pdfIt also leads to the loss of the privacy of the individual. If it is.pdf
It also leads to the loss of the privacy of the individual. If it is.pdfinfo430661
 
In pure water acidity or basness doesnt depend on tempratureReas.pdf
In pure water acidity or basness doesnt depend on tempratureReas.pdfIn pure water acidity or basness doesnt depend on tempratureReas.pdf
In pure water acidity or basness doesnt depend on tempratureReas.pdfinfo430661
 
I, alpha,II.SolutionI, alpha,II..pdf
I, alpha,II.SolutionI, alpha,II..pdfI, alpha,II.SolutionI, alpha,II..pdf
I, alpha,II.SolutionI, alpha,II..pdfinfo430661
 
Given below is the completed implementation of MyLinkedList class. O.pdf
Given below is the completed implementation of MyLinkedList class. O.pdfGiven below is the completed implementation of MyLinkedList class. O.pdf
Given below is the completed implementation of MyLinkedList class. O.pdfinfo430661
 
Generally 12 cranial nerves are there. Among all these II optic cran.pdf
Generally 12 cranial nerves are there. Among all these II optic cran.pdfGenerally 12 cranial nerves are there. Among all these II optic cran.pdf
Generally 12 cranial nerves are there. Among all these II optic cran.pdfinfo430661
 
First, we need to forecast exchange rates for the next three years..pdf
First, we need to forecast exchange rates for the next three years..pdfFirst, we need to forecast exchange rates for the next three years..pdf
First, we need to forecast exchange rates for the next three years..pdfinfo430661
 

More from info430661 (20)

Yes, molality = moles of solute kg of solventSolutionYes, mo.pdf
Yes, molality = moles of solute  kg of solventSolutionYes, mo.pdfYes, molality = moles of solute  kg of solventSolutionYes, mo.pdf
Yes, molality = moles of solute kg of solventSolutionYes, mo.pdf
 
When Laura left her job as a law firm manager to launch her own busi.pdf
When Laura left her job as a law firm manager to launch her own busi.pdfWhen Laura left her job as a law firm manager to launch her own busi.pdf
When Laura left her job as a law firm manager to launch her own busi.pdf
 
WaterMolarity of pure water is 55.5 M. It is calculated as below..pdf
WaterMolarity of pure water is 55.5 M. It is calculated as below..pdfWaterMolarity of pure water is 55.5 M. It is calculated as below..pdf
WaterMolarity of pure water is 55.5 M. It is calculated as below..pdf
 
The degree is 3 and the leading coefficient is -11.SolutionThe.pdf
The degree is 3 and the leading coefficient is -11.SolutionThe.pdfThe degree is 3 and the leading coefficient is -11.SolutionThe.pdf
The degree is 3 and the leading coefficient is -11.SolutionThe.pdf
 
moles of HCl = 500.1 = 5 moles of NaOH = 20.50..pdf
                     moles of HCl = 500.1 = 5 moles of NaOH = 20.50..pdf                     moles of HCl = 500.1 = 5 moles of NaOH = 20.50..pdf
moles of HCl = 500.1 = 5 moles of NaOH = 20.50..pdf
 
Kc = [H2][I2][HI]^2 Kc = 1.84 x 10^-2 .pdf
                     Kc = [H2][I2][HI]^2  Kc = 1.84 x 10^-2          .pdf                     Kc = [H2][I2][HI]^2  Kc = 1.84 x 10^-2          .pdf
Kc = [H2][I2][HI]^2 Kc = 1.84 x 10^-2 .pdf
 
Ionic bond 1.The atoms are bound together by the.pdf
                     Ionic bond 1.The atoms are bound together by the.pdf                     Ionic bond 1.The atoms are bound together by the.pdf
Ionic bond 1.The atoms are bound together by the.pdf
 
Importance of Phosphorylated Intermediates Each o.pdf
                     Importance of Phosphorylated Intermediates Each o.pdf                     Importance of Phosphorylated Intermediates Each o.pdf
Importance of Phosphorylated Intermediates Each o.pdf
 
Solution of the Questions with ExplanationPart AThe Domain Name.pdf
Solution of the Questions with ExplanationPart AThe Domain Name.pdfSolution of the Questions with ExplanationPart AThe Domain Name.pdf
Solution of the Questions with ExplanationPart AThe Domain Name.pdf
 
Sexual selection is a type of natural selection. Sexual selection ac.pdf
Sexual selection is a type of natural selection. Sexual selection ac.pdfSexual selection is a type of natural selection. Sexual selection ac.pdf
Sexual selection is a type of natural selection. Sexual selection ac.pdf
 
PPSS x ppss is a dihybrid cross. P, p, S and s are alleles for corn .pdf
PPSS x ppss is a dihybrid cross. P, p, S and s are alleles for corn .pdfPPSS x ppss is a dihybrid cross. P, p, S and s are alleles for corn .pdf
PPSS x ppss is a dihybrid cross. P, p, S and s are alleles for corn .pdf
 
package com.tictactoe; public class Main {public void play() {.pdf
package com.tictactoe; public class Main {public void play() {.pdfpackage com.tictactoe; public class Main {public void play() {.pdf
package com.tictactoe; public class Main {public void play() {.pdf
 
d. tyrosine (it acts as a nucleophile) .pdf
                     d. tyrosine (it acts as a nucleophile)           .pdf                     d. tyrosine (it acts as a nucleophile)           .pdf
d. tyrosine (it acts as a nucleophile) .pdf
 
ORSolutionOR.pdf
ORSolutionOR.pdfORSolutionOR.pdf
ORSolutionOR.pdf
 
It also leads to the loss of the privacy of the individual. If it is.pdf
It also leads to the loss of the privacy of the individual. If it is.pdfIt also leads to the loss of the privacy of the individual. If it is.pdf
It also leads to the loss of the privacy of the individual. If it is.pdf
 
In pure water acidity or basness doesnt depend on tempratureReas.pdf
In pure water acidity or basness doesnt depend on tempratureReas.pdfIn pure water acidity or basness doesnt depend on tempratureReas.pdf
In pure water acidity or basness doesnt depend on tempratureReas.pdf
 
I, alpha,II.SolutionI, alpha,II..pdf
I, alpha,II.SolutionI, alpha,II..pdfI, alpha,II.SolutionI, alpha,II..pdf
I, alpha,II.SolutionI, alpha,II..pdf
 
Given below is the completed implementation of MyLinkedList class. O.pdf
Given below is the completed implementation of MyLinkedList class. O.pdfGiven below is the completed implementation of MyLinkedList class. O.pdf
Given below is the completed implementation of MyLinkedList class. O.pdf
 
Generally 12 cranial nerves are there. Among all these II optic cran.pdf
Generally 12 cranial nerves are there. Among all these II optic cran.pdfGenerally 12 cranial nerves are there. Among all these II optic cran.pdf
Generally 12 cranial nerves are there. Among all these II optic cran.pdf
 
First, we need to forecast exchange rates for the next three years..pdf
First, we need to forecast exchange rates for the next three years..pdfFirst, we need to forecast exchange rates for the next three years..pdf
First, we need to forecast exchange rates for the next three years..pdf
 

Recently uploaded

Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportAvinash Rai
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...Denish Jangid
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfTamralipta Mahavidyalaya
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxDenish Jangid
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxbennyroshan06
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxJisc
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chipsGeoBlogs
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsCol Mukteshwar Prasad
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...Nguyen Thanh Tu Collection
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPCeline George
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXMIRIAMSALINAS13
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptxJosvitaDsouza2
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345beazzy04
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxssuserbdd3e8
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasGeoBlogs
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationDelapenabediema
 

Recently uploaded (20)

Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 

1.Define what an Advanced Persistent Threat(APT) is.Advanced - far.pdf

  • 1. 1.Define what an Advanced Persistent Threat(APT) is. Advanced - far on or ahead in development or progress Persistent - continuing firmly in course of action in spite of difficulty or opposition Threat - a thing likely to cause damage or danger. Now let us put all of the above meanings and the process together. APT is a continuous computer hacking processes in spite of difficulty or opposition, done by humans for business or political motives which is ahead in development and progress to cause damage or danger. 2.How might an APT be used in a Cyber War to inflict damage on Industrial Control Systems? Background Industrial Control Systems - Control systems used inindustrial production Cyber War - The use of computer technology to disrupt the activities of communication systems APT can be started with a simple USB stick getting inserted into a machine which is connected to LAN of the systems which is targetted to damage. With continuous hacking, can get into the control systems and get the control over them to destroy. 3.Provide an example of an APT being used to cause damage to an Industrial Control System Stuxnet Solution 1.Define what an Advanced Persistent Threat(APT) is. Advanced - far on or ahead in development or progress Persistent - continuing firmly in course of action in spite of difficulty or opposition Threat - a thing likely to cause damage or danger. Now let us put all of the above meanings and the process together. APT is a continuous computer hacking processes in spite of difficulty or opposition, done by humans for business or political motives which is ahead in development and progress to cause damage or danger. 2.How might an APT be used in a Cyber War to inflict damage on Industrial Control Systems? Background Industrial Control Systems - Control systems used inindustrial production Cyber War - The use of computer technology to disrupt the activities of communication systems APT can be started with a simple USB stick getting inserted into a machine which is connected to LAN of the systems which is targetted to damage. With continuous hacking, can get into the control systems and get the control over them to destroy.
  • 2. 3.Provide an example of an APT being used to cause damage to an Industrial Control System Stuxnet