An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception). These objectives typically include establishing and extending footholds within the information technology infrastructure of the targeted organizations for purposes of exfiltrating information, undermining or impeding critical aspects of a mission, program, or organization; or positioning itself to carry out these objectives in the future. The advanced persistent threat:
- pursues its objectives repeatedly over an extended period of time,
- adapts to defenders’ efforts to resist it, and
- is determined to maintain the level of interaction needed to execute its objectives.
Please sign in to leave a comment.