Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Advanced Persistent Threat (APT)

Handbook of Research on Human Factors in Contemporary Workforce Development
Is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. The intention of an APT attack is usually to steal data of organization.
Published in Chapter:
Employer Branding and Internet Security
Ewa Maria Matuska (Pomeranian Academy, Poland) and Joanna Grubicka (Pomeranian Academy, Poland)
DOI: 10.4018/978-1-5225-2568-4.ch016
Abstract
This chapter promotes the concept of employer branding (EB) as special kind of value management being part of strategic human resources management (SHRM) and including elements of cyber security. Employees' and organization's shared values (EVPs) bring opportunity to create common sense of identity, which prevents potentially aversive behavior towards company's reputation. Chapter's background positions EB and EVP in process of SHRM, introduces the view of EB as architectural frame for core organizational values, and describes popular Internet tools of EB. The background is closed by descriptions of common Internet threats, their implications to overall organization's information security, as well as useful Internet security systems. Chapter concludes with recommendations regarding enhancing EB by better controlling company's information security. As a new research area is proposed sub-discipline of cyber security in management, with special dedication to SHRM.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Practical Align Overview of the Main Frameworks Used by the Companies to Prevent Cyber Incidents
This is a specific type of cyber-attack, where the attacker uses different type and methodology of attacks and usually these attacks are directed and aim a specific target.
Full Text Chapter Download: US $37.50 Add to Cart
Online Social Networks Misuse, Cyber Crimes, and Counter Mechanisms
It is a broad term used to describe an attack campaign in which an intruder, or team of intruders, establishes an illicit, long-term presence on a network, to mine highly sensitive data and are significantly more complicated.
Full Text Chapter Download: US $37.50 Add to Cart
Evolution From IT Governance to Cyber-Agility
A long-term, targeted cyber-attack where an intruder gains access to a network and remains undetected, often for malicious purposes.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR