{"id":368,"date":"2024-04-16T23:50:03","date_gmt":"2024-04-16T23:50:03","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/calebbryant\/?p=368"},"modified":"2024-04-16T23:50:03","modified_gmt":"2024-04-16T23:50:03","slug":"article-review-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/calebbryant\/2024\/04\/16\/article-review-2\/","title":{"rendered":"Article review #2"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><br>APT Detection through<br>Introduction<br>The field of cybersecurity is always evolving, and that&#8217;s not always a good thing. Specifically<br>when it comes to Advanced Persistent Threats (APTs), there seem to be endless ways around<br>the technology we have today. These schemes are made to trick traditional security systems, so<br>new detection techniques must be developed. In this review, we&#8217;ll go over some of the reasons<br>why these attacks can go unnoticed and create such a big problem. As well as how this study<br>can contribute to making our data safer.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>Hypotheses<br>The study brings up several hypotheses about APT detection methods:<br>H1: There are multiple ways to detect an APT attack but all have varying degrees of<br>effectiveness.<br>H2: Not every method works on any attack, there are specific vulnerabilities or attributes that<br>make some more difficult than others.<br>H3: Multi-stage attacks are extremely difficult or outright impossible to prevent thanks to their<br>complicated design and ability to dodge traditional security measures.<br>H4: The recent advancements in technology have changed how APTs work, meaning only<br>studies and industry work from January 2015 through April 2020 will reflect the modern state<br>of these attacks.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>Analysis and Methodologies<br>Thematic analysis helps researchers identify trends in APT detection techniques. Classification-<br>based analysis takes different approaches and separates them so they can be studied<br>individually. Data synthesis focuses on multi-stage behaviors and aids in understanding them<br>along with effective detections methods. All of these methodologies show how carefully they&#8217;re<br>integrating technology into their research.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>In class relations<br>We&#8217;ve discussed privacy and data security before. We&#8217;ve also talked about digital divide along<br>with cybersecurity workforce diversity. All important topics that tie directly into this study&#8217;s<br>focus on APT detection methods. Its clear goal is understanding how different groups might<br>interact with tech like public WiFi at Staples for example, given their unique concerns.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>Social Implications<br>When stuff like this happens it&#8217;s usually marginalized communities hit the hardest. They don&#8217;t<br>have the same access to resources as everyone else, making them perfect targets for<br>cybercriminals. By focusing on them, we can start to understand and address these concerns<br>better.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>Conclusion<br>We all want a secure digital space but traditional methods just aren&#8217;t going to cut it. With such<br>an inclusive approach in mind, this study takes important steps toward better cybersecurity<br>practices. By identifying trends and strategies in APT attacks, they&#8217;ve set future research up<br>with a good foundation that could bring us closer to our goal.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Work Cited<br>Nur Ilzam Che Mat, Norziana Jamil, Yunus Yusoff, Miss Laiha Mat Kiah, A<br>systematic literature review on advanced persistent threat behaviors and its<br>detection strategy, Journal of Cybersecurity, Volume 10, Issue 1, 2024,<br>tyad023, https:\/\/doi.org\/10.1093\/cybsec\/tyad023<a href=\"https:\/\/doi.org\/10.1093\/cybsec\/tyad023\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>APT Detection throughIntroductionThe field of cybersecurity is always evolving, and that&#8217;s not always a good thing. Specificallywhen it comes to Advanced Persistent Threats (APTs), there seem to be endless ways aroundthe technology we have today. These schemes are made to trick traditional security systems, sonew detection techniques must be developed. In this review, we&#8217;ll go&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/calebbryant\/2024\/04\/16\/article-review-2\/\">Read More<\/a><\/div>\n","protected":false},"author":27571,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/posts\/368"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/users\/27571"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/comments?post=368"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/posts\/368\/revisions"}],"predecessor-version":[{"id":369,"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/posts\/368\/revisions\/369"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/media?parent=368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/categories?post=368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/calebbryant\/wp-json\/wp\/v2\/tags?post=368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}