Rozebírá je studie (s názvem Defending Against Advanced Persistent Threats, 25 stran) spole?nosti Solutionary:
- Planning & Info Gathering
- Attack and Compromise (Breach)
- Establish Command and Control
- Authorization and Credential Theft
- Manual Exploitation and Information Gathering
- Data Exfiltration
- Maintain Persistence