Michael A. Blanchard

CYSE201S

Professor Diwakar

02/14/2024

Based on the article I have chosen, this topic relates to the principles of the social sciences by the topic of cybersecurity, including alot of discuss about APT detection, intersects with principles of the social sciences by acknowledging the socio-technical nature of cybersecurity threats. Understanding APT behaviors requires insight into human motivations, organizational dynamics, and societal vulnerabilities that influence cyberattack strategies. One of the research questions posed would be What are the trends in APT detection techniques over time? And another would be how do APT attacks differ methodologically from other cyber-attacks as in what is the main difference between the two. From this article, there are a few of some research methods used such as the (SLR) approach and some of the reporting items. The research often involves pre-review planning, review execution, and report articulation, ensuring transparency, accuracy, and comprehensiveness in the review process. The Data involved with this article is when it talks about academic research articles and cybersecurity solutions. As the analysis talks heavily about categorizing and evaluating APT detection techniques, identifying alot of pros and cons and what uplifts them and what is going to potentially bring them down. There are a few of some concepts that have been discussed in PowerPoint presentations on cybersecurity, such as threat modeling, attack vectors, and defense strategies, are relevant to the article. The study extends these concepts by emphasizing the importance of understanding APT behaviors and proposing advanced detection methods aligned with real-world attack scenarios. The article has its main focus on security and improving corporate security indirectly and how it will aid and help all customers. By enriching APT detection abilities, the analysis and studies donate to protecting their main assets and defending against probable harm to many people. This analysis constructs and creates important assistance to humanity by more tech rising and giving us more ways to do things like forwarding mail, keeping our info, easy access to banks and etc. Closing the hole and void between academic research and industry practices, the research offers practical insights for enhancing organizational security and mitigating the impact of APTs on society.

Cite: Nur Ilzam Che Mat, Norziana Jamil, Yunus Yusoff, Miss Laiha Mat Kiah, A systematic literature review on advanced persistent threat behaviors and its detection strategy, Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyad023, https://doi.org/10.1093/cybsec/tyad023