Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective

被引:6
作者
Nicho, Mathew [1 ]
Khan, Shafaq [2 ]
机构
[1] Univ Dubai, Coll Informat Technol, MSc Program, Dubai, U Arab Emirates
[2] Univ Dubai, Coll Informat Technol, Dubai, U Arab Emirates
关键词
Advanced Persistent Threats; APT; Data Breach; Information Security; Phishing; Social Engineering; Spear-Phishing;
D O I
10.4018/ijisp.2014010101
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
One of the most serious and persistent threat that has emerged in recent years combining technical as well as non-technical skills is the Advanced Persistent Threat, commonly known as APT where hackers circumvent the organizational defenses and instead target the naivety of the employees in making an unintentional mistake. While this threat has gained prominence in recent years, research on its cause and mitigation is still at the infancy stage. In this paper the authors explore APT vulnerabilities from an organizational perspective to create a taxonomy of non-technical and technical vulnerabilities. The objective is to enhance awareness and detection of APT vulnerabilities by managers and end users. To this end, the authors conducted interviews with senior IT managers in three large organizations in Dubai, United Arab Emirates. The analysis of the findings suggested that the APT threat environment is affected by multiple factors spanning primarily nontechnical as well as technical vulnerabilities.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 50 条
[21]   Advanced Persistent Threats Detection based on Deep Learning Approach [J].
Eke, Hope Nkiruka ;
Petrovski, Andrei .
2023 IEEE 6TH INTERNATIONAL CONFERENCE ON INDUSTRIAL CYBER-PHYSICAL SYSTEMS, ICPS, 2023,
[22]   Advanced Persistent Threats (APT): evolution, anatomy, attribution and countermeasures [J].
Sharma A. ;
Gupta B.B. ;
Singh A.K. ;
Saraswat V.K. .
Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (07) :9355-9381
[23]   Applying The Attacks Tracer on Advanced Persistent Threats to Real Networks [J].
Tajima, Yuya ;
Koide, Hiroshi .
2021 NINTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS, CANDARW, 2021, :392-397
[24]   Devil in the Noise: Detecting Advanced Persistent Threats with Backbone Extraction [J].
Viana, Caio M. C. ;
Ferreira, Carlos H. G. ;
Murai, Fabricio ;
dos Santos, Aldri Luiz ;
Pereira, Lourenco Alves, Jr. .
2024 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, ISCC 2024, 2024,
[25]   Exploring the Role of Artificial Intelligence in Detecting Advanced Persistent Threats [J].
Brandao, Pedro Ramos .
COMPUTERS, 2025, 14 (07)
[26]   Detecting and Identifying Insider Threats Based on Advanced Clustering Methods [J].
Nikiforova, Oksana ;
Romanovs, Andrejs ;
Zabiniako, Vitaly ;
Kornienko, Jurijs .
IEEE ACCESS, 2024, 12 :30242-30253
[27]   Detecting Advanced Persistent Threats Based on Entropy and Support Vector Machine [J].
Tan, Jiayu ;
Wang, Jian .
ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 :153-165
[28]   A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments [J].
Halabi, Talal ;
Chaudhry, Aawista ;
Alqahtani, Sarra ;
Zulkernine, Mohammad .
2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
[29]   A dynamic provenance graph-based detector for advanced persistent threats [J].
Wang, Lin ;
Fang, Lanting ;
Hu, Yining .
EXPERT SYSTEMS WITH APPLICATIONS, 2025, 265
[30]   Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats [J].
Tizio, Giorgio Di ;
Armellini, Michele ;
Massacci, Fabio .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2023, 49 (03) :1359-1373