Sunteți pe pagina 1din 1

1. Dr. Sam Musa. "Advanced Persistent Threat - APT".

https://repository.aust.edu.ng/xmlui/bitstream/handle/123456789/621/EZEFOSIE
%20Nkirue.pdf?sequence=1&isAllowed=y

Anatomy of an Advanced Persistent Threat (APT)". Dell Secure Works. Retrieved 2012-
05-21

Are you being targeted by an Advanced Persistent Threat?� Command Five Pty Ltd.
Retrieved 2011-03-31.

Search for malicious files". Malicious File Hunter. Retrieved 2014-10-10.

The changing threat environment ..." Command Five Pty Ltd. Retrieved 2011-03-31.

An Evolving Crisis". BusinessWeek. April 10, 2008. Archived from the original on 10
January 2010. Retrieved 2010-01-20.

Olavsrud, Thor. "Targeted Attacks Increased, Became More Diverse in 2011". PCWorld.

6. Eric M. Hutchins; Michael J. Clopperty; Rohan M. Amin. "Intelligence-Driven


Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion
Kill Chains" (PDF). Lockheed Martin Corporation Abstract. Retrieved March 13, 2013.

Introducing Forrester's Cyber Threat Intelligence Research". Forrester Research.


Retrieved 2014-04-14.

Assessing Outbound Traffic to Uncover Advanced Persistent Threat" (PDF). SANS


Technology Institute. Retrieved 2013-04-14.

Advanced Persistent Threats: Learn the ABCs of APTs - Part A". Secure Works. Secure
Works. Retrieved 23 January 2017.

S-ar putea să vă placă și