Treść książki

Przejdź do opcji czytnikaPrzejdź do nawigacjiPrzejdź do informacjiPrzejdź do stopki
MATTEOCASENOVE,KAJAKOWALCZEWSKA
APT—theNewCyberforce?
ModernTypesofCyberthreats
Today,itisimpossibletoimagineamilitary,politicaloreconomic
strategywithouttechnologytosimplifyandstreamlineeverydayoperations
andprocessmassiveamountsofmoreorlessconfidentialdata.Eventhough
theideaofanewkindofbattlefield,devoidofconventionalarms,tanksand
aircraftisatbestadistantreality,theemergenceofthecybercommunityand
itsgovernanceisinescapable.Technologicalevolutionisinstrumentalinthe
improvementofefficiencyinallspheresofpublicgovernance,but,atthe
sametime,informationandinfrastructurearebeingexposedtopermanent
risks,andarepotentialtargetofanyplayerwithsufficientskillsorresources.
Inrecentyears,thescaleofsuchthreatshasbeendemonstratedbyStuxnet,
Flame,RedOctoberandothermalwarerepresentingafractureincyberattack
tactics.1Thesekindsofmalicioussoftwarearetheweaponsinnational
cyberespionagecampaignsandcriticalinfrastructureattacks,slowlyand
silentlybuildinguptothenextgenerationofcyberconflicts.2Thesehigh
profileandhigh-riskcampaignsareusuallyidentifiedandclassifiedas
AdvancedPersistentThreats(APT).
AnAPTisasophisticated,targetedattackagainstacomputingsystem
containingahigh-valueassetorcontrollingaphysicalsystem.APTsoften
requireformidableresources,expertiseandoperationalorchestration.3States
1
N.Virvilis,D.Gritzalis,TheBigFour—WhatWeDidWronginAdvancedPersistent
ThreatDetection?,EighthARESConferenceinRegensburg,2013,pp.248-254.
2
C.Tankard,“AdvancedPersistentThreatsandHowtoMonitorandDeterThem,”Network
Security,vol.2011,pp.16-19.
3
A.Juels,T.Yen,SherlockHolmesandthecaseoftheadvancedpersistentthreat,Fifth
LEETUSENIX,2012,p.2.
ThePolishQuarterlyofInternationalAffairs,2015,no.3
7