Saturday, September 8, 2012

APTs: Why Security Intelligence is Required






HACKING ATTACKS ARE ALWAYS SCARY, YET A RECENT IDG RESEARCH
SURVEY OF CSOs AND OTHER IT LEADERS PAINTS AN EVEN SCARIER
PICTURE: ADVANCED PERSISTENT THREATS (APTs) ARE ON THE RISE.
FORTUNATELY, RESPONDENTS ARE WELL AWARE OF THE DANGERS
ASSOCIATED WITH APTs EVEN THOUGH VERY FEW HAVE CONFIDENCE
IN THEIR ABILITY TO SUCCESSFULLY FIGHT OFF SOPHISTICATED ATTACKS.


Reference


Cyber Warfare


                                  CYBER WARFARE
AN ANALYSIS OF THE MEANS AND MOTIVATIONS OF
                          SELECTED NATION STATES




Cyber warfare involves units organized along nation-state boundaries, in offensive and defensive
operations, using computers to attack other computers or networks through electronic means.
Hackers and other individuals trained in software programming and exploiting the intricacies of
computer networks are the primary executors of these attacks. These individuals often operate
under the auspices and possibly the support of nation-state actors. In the future, if not already
common practice, individual cyber warfare units will execute attacks against targets in a
cooperative and simultaneous manner.

The purpose of this report is to provide a realistic assessment of the capabilities, means, and
motivations of selected nation-states to conduct a remote, computer-to-computer attack either
against the United States or against regional adversaries. We take as a given that there is no such
thing as “perfect” IT security. (Billio, 2004)






Reference

http://www.ists.dartmouth.edu/docs/cyberwarfare.pdf

CIO White Papers

URL:
http://www.cio.com/white-