One Article Review

Accueil - L'article:
Source NoticeBored.webp NoticeBored
Identifiant 2148848
Date de publication 2020-07-06 17:45:47 (vue: 2021-01-06 20:37:57)
Titre NBlog July 6 - of APTs and RPTs
Texte Do you recall when APTs were A Thing? Advanced Persistent Threats were exemplified by Stuxnet, a species of malware that was stealthy enough to penetrate the defences of an Iranian nuclear fuel processing plant ten years ago, persistent enough to undermine numerous layers of control, and sophisticated enough to over-speed and wreck the centrifuges without alerting the plant operators until the damage was done.  We seldom hear of weapons-grade APTs these days, suggesting they are no longer newsworthy or effective. Maybe they have gone the way of the trebuchet or musket ... but I believe it's much more likely that APTs have become even more sophisticated, stealthier and more damaging now than ever before, especially given the ascendance of IoT, IIoT and 'cyber-physical systems'. Now, Things are A Thing.Meanwhile, we are frequently constantly assaulted by ordinary, conventional, old-school malware - Retarded Persistent Threats as it were.In contrast to APTs, RPTs are relatively crude and commonplace - more blunderbuss than sniper's rifle but every bit as devastating at close range. Despite becoming increasingly sophisticated and capable, they are presumably well behind APTs, especially given governmental investments in cyber capabilities as part of national defence spending.RPTs 'persist' in the sense that they steadfastly refuse to go away. Bog-standard malware has dogged computer systems, networks and users since the 1980s. It has grown in prevalence at least as fast as IT, and in some ways it has driven advances in IT. The few percent of system resources needed to run today's antivirus packages and firewalls would surely have brought systems from previous decades to their little silicon knees.Whereas most RPT incidents are, well, incidental in relation to our global society, they threaten the very large number of vulnerable systems, individuals and organisations out there. It has become painfully obvious during COVID-19 that vanishingly few organisations stand alone, immune to the global repercussions. We are all entangled in, and highly dependent upon, a global mesh of information, goods and services. Just as a single COVID case causes knock-on effects, an RPT incident creates ripples.We're lucky that, so far, neither real-world nor
Envoyé Oui
Condensat   we  come 1980s additional advanced ago alerting all alone antivirus anything apocalypse apts archival are aren ascendance assaulted away become becoming before behind believe bit blog blunderbuss bog brought build bunkers but byte capabilities capable carve case causes centrifuges chisel chord close comments commonplace computer contrast control conventional covid crazy creates crude cyber damage damaging day days decades defence defences dependent despite devastating dogged done driven advances dug during edge effective effects emerge enough entangled especially even ever every exemplified far fast fear firepower firewalls forest frequently constantly from fuel geek given global gone goods governmental grade grown guess has have hear hieroglyphics highly idea iiot immune incident incidental incidents incoherent increasingly individuals information infosec investments iot iranian july just knees knock large last layers least likely little loco longer lucky malware may maybe mean meanwhile medium merely mesh more most much musket national nblog need needed neither networks newsworthy nor not now nuclear number numerous obvious old one onto operators ordinary organisations out over packages painfully paranoid part penetrate percent perhaps persist persistent physical piece plant preppers presumably prevalence previous processing protect proven push ramblings range real recall refuse relation relatively repercussions resources retarded rifle ripples rock rpt rpts run school secure seem seldom sense services should silicon since single sniper society some sophisticated species speed spending stand standard steadfastly stealth stealthier stealthy strange struck stuxnet such suggesting surely system systems ten than then these thing things those thousands threaten threats tipped today too trebuchet triggering undermine until upon users vanishingly very virtual viruses vulnerable way ways weapons welcome well what when whereas will without wonder world would wreck years zombie zombies
Tags Malware
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: