Cyber Security and APT Groups
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F60162694%3AG43__%2F21%3A00557511" target="_blank" >RIV/60162694:G43__/21:00557511 - isvavai.cz</a>
Výsledek na webu
<a href="https://ieeexplore.ieee.org/document/9583744" target="_blank" >https://ieeexplore.ieee.org/document/9583744</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1109/KIT52904.2021.9583744" target="_blank" >10.1109/KIT52904.2021.9583744</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Cyber Security and APT Groups
Popis výsledku v původním jazyce
This research aims to describe and analyse APT (Advanced Persistent Thread) groups and their activities. Information was taken from articles, reports, and studies; published by organizations dealing with cybersecurity. APT groups often operate in state sponsorship, but could also be sponsored by a company to obtain sensitive information about their competitors. The term APT is explained and then described in detail. The well-known APT groups from China, Russia, North Korea and Iran are included. The main goal of APT activities is espionage, financial gain, intelligent property theft, and sabotage. The life cycle of the APT attack is analysed and discussed. In the paper are compared four life cycle examples; they are divided into phases, from five to ten. The initial phase of all life cycles is „reconnaissance”. It determines the success of the attack and, of course, the reliability of the defence. The future research of APT groups is mentioned.
Název v anglickém jazyce
Cyber Security and APT Groups
Popis výsledku anglicky
This research aims to describe and analyse APT (Advanced Persistent Thread) groups and their activities. Information was taken from articles, reports, and studies; published by organizations dealing with cybersecurity. APT groups often operate in state sponsorship, but could also be sponsored by a company to obtain sensitive information about their competitors. The term APT is explained and then described in detail. The well-known APT groups from China, Russia, North Korea and Iran are included. The main goal of APT activities is espionage, financial gain, intelligent property theft, and sabotage. The life cycle of the APT attack is analysed and discussed. In the paper are compared four life cycle examples; they are divided into phases, from five to ten. The initial phase of all life cycles is „reconnaissance”. It determines the success of the attack and, of course, the reliability of the defence. The future research of APT groups is mentioned.
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
—
OECD FORD obor
10200 - Computer and information sciences
Návaznosti výsledku
Projekt
—
Návaznosti
I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace
Ostatní
Rok uplatnění
2021
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
2021 Communication and Information Technologies (KIT)ˇProceedings
ISBN
978-1-6654-2880-4
ISSN
—
e-ISSN
—
Počet stran výsledku
8
Strana od-do
73-80
Název nakladatele
Armed Forces Academy of General Milan Rastislav Štefánik
Místo vydání
Liptovský Mikuláš, Slovakia
Místo konání akce
OnLine
Datum konání akce
13. 10. 2021
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
—