1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
4 years ago
6

A(n) _____ is a network attack in which an intruder gains access to a network and stays undetected with the intention of stealin

g data.
Computers and Technology
1 answer:
Archy [21]4 years ago
7 0

Answer:

Advanced persistent threat (APT)

Explanation:

The above is defined as follow.

Advanced

The attacker uses advanced technological utilities to enter the network and remain unidentified.

Persistent

The attacker upon entering the network, remains focused on the given task, i.e., establishing back door throughout the network by utilizing malware.

Threat

This is both a threat and an attack. The threat to information and an attack since unwanted infrastructure is installed by the attacker.

In this type of attack, the hacker ( or unauthorized party ) manages to access the network. The presence of the hacker is not known, and the hacker remains hidden. The sole reason for this attack is to gain access to the data and not disrupting the network or the organization.

This type of attack is a major threat to organizations involved in security, financial transactions and production industry.

The hacker leaves the network once the hacker gets hold of the information. The hacker enters and exits the network quickly to avoid being noticed.

The hacker enters the network through legitimate way. Next, the hacker manages to acquire login information of an authorized user. As and when the hacker can move across the network using the login of another authorized user, the hacker begins creating the back door. The back doors established by the hacker help in exiting the network.

The above cycle is carried on until the hacker remains unidentified.

This is a unique and more dangerous threat since the attacker remains unidentified for a long period of time. In this duration, the attacker records the information easily.

APT Mitigation

Traditional security mechanisms prove ineffective in combating with APT. Due to varied types of malware software, it is not easy to detect APT. This makes the protection from APT somewhat difficult.

Deep analysis of the network activities and highly sophisticated security mechanism can help mitigate APT.

You might be interested in
Given the three side lengths, how can you tell if a triangle<br>is a right triangle?​
Tatiana [17]
<h3>Sample Response from Edge 2020:</h3>

Square all side lengths. If the longest side length squared is equal to the sum of the squares of the other two side lengths, then it is a right triangle.

8 0
3 years ago
Which are among the ways you can use bitlocker encryption? (choose all that apply?
igor_vitrenko [27]
There is a lot of ways that you can use the bit locker encryption. Some are when you are authenticating your computer using a TPM. Or when you are authenticating your account using a USB Flash drive, and most on the phones authentication through text messages and all.
3 0
4 years ago
What do you think that private information like passwords pin number will be guarded or shared with the public? why?
konstantin123 [22]

The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.

<h3>Why should you use passwords to protect private information?</h3>

Passwords is known to be that factor that tends to give the first line of defense against any form of what we call illegal access to your computer and also that of one's personal information.

Note that the stronger a password of a person is, the more protected one can say that one's computer will be from any kind of hackers and malicious software.

Therefore one need to or one  should maintain the use of a strong passwords for all accounts that are present on your computer.

Hence, The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.

Learn more about passwords from

brainly.com/question/17174600

#SPJ1

4 0
2 years ago
What part of the code is a signal for the function to execute and pass back a value?
Trava [24]

Answer:

2

Explanation:

6 0
3 years ago
Read 2 more answers
Create a button to play the playlist <br><br> Java, netbeans
Pavel [41]
I'm not sure but maybe one of the two websites can help you
.
http://wiki.netbeans.org/MusicAppUsingRESTRemoting

https://mukeshscience.wordpress.com/2014/05/26/adding-audio-to-java/

6 0
4 years ago
Read 2 more answers
Other questions:
  • In Microsoft Word you can access the _______ command from the "Mini toolbar
    11·1 answer
  • John would like to move from the city into the suburbs and has been saving up a large down payment for a home. Which is the most
    7·1 answer
  • What is hyper transport
    10·1 answer
  • What is a benefit of the rise in citizen journalism? Multiple answer choice below
    13·1 answer
  • Secondary hard drive whats its purpose
    5·1 answer
  • The sequence's insert member function normally puts a new item before the current item. What should insert do if there is no cur
    9·1 answer
  • How will Artificial Intelligence change the way we do things? .......C-Claim:
    10·1 answer
  • Help! Picture provided
    7·2 answers
  • A student can improve performance by decreasing
    14·1 answer
  • What's the difference between a robot and a machine?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!