Can the fence really block a giant monster? So is the firewall really able to withstand apt attacks? The fact that defensive measures are likely to be compromised or lost in circumstances beyond control requires a deeper defense approach.
Apt attacks may come from within the defensive point of the perimeter defense design, and consider the following scenarios:
External Network online
Before the device enters your company's door, it is not under your control and influence, which is likely to be exploited by the enemy.
Island hopping tactics
The seemingly friendly surface with which you are online is a way to attack the enemy.
Poison Well Strategy
The enemy may bypass the security defense system and attack without being detected.
Conclusion:
The enemy is likely to bypass your border IT security defenses, perhaps using malware to pass through your door, or by trusting the online to do the island hopping tactic, or by attacking an internal application.
These are premeditated attacks on how you prevent