================================================
Long-tail intrusion
From whatis.com was last updated in November 2014
Contributor(s): Matthew Haughn
Posted by: Margaret Rouse
A long-tail
intrusion is a network intrusion that occurred in the past and has persisted
for some time.
Long-tail
intrusions include advanced persistent threats (APT).
However, sometimes intrusions achieved by simpler methods and malware may be
used as the starting point of a long-tail intrusion and continued by
downloading new code by means such as Trojans
hidden by root kits
and code targeting zero day vulnerabilities.
Hackers of all stripes use these methods to gain long-term access for web crime, legitimate law enforcement, government spying and hacktivism. Access to the actual targeted data or network resource may take some time, during which the attacker could get other information from and about the network that may be valuable in itself both before and afterwards.
Hackers of all stripes use these methods to gain long-term access for web crime, legitimate law enforcement, government spying and hacktivism. Access to the actual targeted data or network resource may take some time, during which the attacker could get other information from and about the network that may be valuable in itself both before and afterwards.
Long-tail
intrusions are a considerable problem in security, especially for those relying
solely on tier 1 security such as a firewall or intrusion prevention, which is
focused solely on preventing initial entry to a network. In organizations with
5000 computers or more, 90 percent have existing breaches, on average, and
these breaches may exist undetected for more than a year.
Tier 2 security
such as breach detection systems (BDS)
focus on malicious activity within the network it protects. BDS determines
possible breaches by differing combinations of heuristics,
traffic analysis, risk assessment, safe marked traffic, data policy
understanding and violation reporting. BDS are sometimes able to detect
breaches as they occur but the systems are designed to identify existing
intrusions.
============================================
In addition to this blog, I have authored the premiere book on Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:
www.amazon.com/author/paulbabicki
If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and PSG of Mercer County New Jersey.
In addition to this blog, I have authored the premiere book on Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:
www.amazon.com/author/paulbabicki
If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and PSG of Mercer County New Jersey.
==========================================
No comments:
Post a Comment