O'Reilly logo

Advanced Persistent Security by Araceli Treu Gomes, Ira Winkler

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Adversary Infrastructure

Abstract

Malignant threats are the most devastating, but you cannot ignore malicious threats. To understand how to mitigate malicious actors, you need to understand the resources and infrastructure that they have to compromise you.

Advanced persistent threats (APTs) have extensive planning, organization, and resources to target an organization. However, even amateurs can find extensive guidance, support, and technical resources readily available on the dark and deep web. By understanding the resources available to your adversary, you can better determine the resources you need to defend your organization.

Keywords

APT; Bitcoin; Botnets; Collection management; Dark web; Deep web; Encryption; Security researchers; Ransomware ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required