Answer:
Advanced persistent threat (APT)
Explanation:
The above is defined as follow.
Advanced
The attacker uses advanced technological utilities to enter the network and remain unidentified.
Persistent
The attacker upon entering the network, remains focused on the given task, i.e., establishing back door throughout the network by utilizing malware.
Threat
This is both a threat and an attack. The threat to information and an attack since unwanted infrastructure is installed by the attacker.
In this type of attack, the hacker ( or unauthorized party ) manages to access the network. The presence of the hacker is not known, and the hacker remains hidden. The sole reason for this attack is to gain access to the data and not disrupting the network or the organization.
This type of attack is a major threat to organizations involved in security, financial transactions and production industry.
The hacker leaves the network once the hacker gets hold of the information. The hacker enters and exits the network quickly to avoid being noticed.
The hacker enters the network through legitimate way. Next, the hacker manages to acquire login information of an authorized user. As and when the hacker can move across the network using the login of another authorized user, the hacker begins creating the back door. The back doors established by the hacker help in exiting the network.
The above cycle is carried on until the hacker remains unidentified.
This is a unique and more dangerous threat since the attacker remains unidentified for a long period of time. In this duration, the attacker records the information easily.
APT Mitigation
Traditional security mechanisms prove ineffective in combating with APT. Due to varied types of malware software, it is not easy to detect APT. This makes the protection from APT somewhat difficult.
Deep analysis of the network activities and highly sophisticated security mechanism can help mitigate APT.