WARNING:
JavaScript is turned OFF. None of the links on this concept map will
work until it is reactivated.
If you need help turning JavaScript On, click here.
This Concept Map, created with IHMC CmapTools, has information related to: APT Attack Model-1, Detected by technical solutions e.g. Anti-virus APT not identified Not Analyzed (Database), Human has to select, Intensive reconaisance victim or organization footprinting timely & repeated "Persistent", custom-made threat-components partly detected Detected by technical solutions e.g. Anti-virus, Point of Attack download links malicious websites, Actors (who) APT- attacks timely & repeated "Persistent", Point of Attack unknown to the public "Advanced" 0-day exploits, Threat Entry Point usb drive found in carpark or physical instal other electronic means, Sophisticated, determined and coordinated Attackers from Russia attacked Estonia?, select attack vector Point of Attack, Organized Criminals use Crimeware-kit e.g. ZeuS or Spyeye, Sophisticated, determined and coordinated Attackers from Wikileaks may be?, Actors (who) financial Organized Criminals, Sophisticated, determined and coordinated Attackers from German BKA?, Point of Attack compromise Point of Intrusion, Point of Attack e.g. Operation Auroa, Stuxnet or Lockheed Attack "Advanced" 0-day exploits has identified, Point of Attack pdf or Micrsoft Office documents e.g. GhostNet known exploits, Sophisticated, determined and coordinated Attackers from Anonymous?, Sophisticated, determined and coordinated Attackers from China? no direct proof, Human has performed Intensive reconaisance