These are premeditated attacks on how you prevent

Source: Internet
Author: User


Can the fence really block a giant monster? So is the firewall really able to withstand apt attacks? The fact that defensive measures are likely to be compromised or lost in circumstances beyond control requires a deeper defense approach.

Apt attacks may come from within the defensive point of the perimeter defense design, and consider the following scenarios:

External Network online

Before the device enters your company's door, it is not under your control and influence, which is likely to be exploited by the enemy.

Island hopping tactics

The seemingly friendly surface with which you are online is a way to attack the enemy.


Poison Well Strategy

The enemy may bypass the security defense system and attack without being detected.

Conclusion:

The enemy is likely to bypass your border IT security defenses, perhaps using malware to pass through your door, or by trusting the online to do the island hopping tactic, or by attacking an internal application.

These are premeditated attacks on how you prevent

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.