Cybersecurity Fundamentals — Hard
Key points
- APTs are carried out by well-resourced adversaries
- APTs maintain persistent access to target networks
- APTs aim for strategic objectives like espionage or data exfiltration
Ready to go further?
Related questions
