What is an APT? What are some practical strategies to protect yourself from an A
ID: 3878349 • Letter: W
Question
What is an APT? What are some practical strategies to protect yourself from an APT?
Identify a large business which suffered a loss of business due to a successful malware attack. Was this a targeted attack? Was a perpetrator ever identified?
What wireless chipset does your personal computing device (laptop or handheld) use? Provide screenshot evidence.
Get access to a Unix/Linux/MacOS command line prompt. Take a screen shot that shows your name typed into the command line, and turn in the picture with this homework. You can do this by 1) getting access to an NJIT server through SSH, 2) buying a computer with the right OS installed, 3) borrowing a computer with the right OS installed, 4) making your windows machine dual-boot, 5) installing a VM on your windows machine 6) creating a bootable USB drive and running off the USB drive, or any other method.
Explanation / Answer
What is an APT?
An advanced persistent threat is a type of network attack vector in which an unauthorized and unidentified person gains access to the network and stays inside the network for a long period of time. This happens if some outsider impersonates identity of a lawful user or accesses the network by introducing a remote access mechanism either via malware or Trojan.
What are some practical strategies to protect yourself from an APT?
Practical strategies to protect and shield from an APT are
Identify a large business which suffered a loss of business due to a successful malware attack. Was this a targeted attack? Was a perpetrator ever identified?
A group of hacker called Guardians of Peace leaked and released data of film studio Sony Pictures On November 24, 2014, by implanting the malware in Sony systems by compromising internal access policies. This was much targeted attack as only Sony systems were affected an sole aim of attack was satisfied. Though GOP published a lot of data and came open in public no arrest was actually made as an individual was never pinned down for this attack.
For wireless one please do it yourself as this can be easily tracked as MAC of the chipset will identify its location and can damage your honor code.
Please run this command on your pc
# lshw -class network
And you will get details of your interface
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.