Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » Generic » APT- Advanced Persistent Threat

APT- Advanced Persistent Threat

An Advanced Persistent Threat (APT) is a highly sophisticated and long-lasting cyberattack strategy. In an APT, intruders infiltrate a network covertly, aiming to steal sensitive data over an extended period while avoiding detection.

Key APT objectives:

  • APT attackers target sensitive data like credit card information, bank accounts, passport details, and more.
  • APTs may seek to disrupt an entire system, including cloud resources, by deleting crucial databases.
  • Attackers may gain control of critical websites, potentially impacting stock markets or vital services like hospitals.
  • APTs aim to access essential systems using stolen user credentials.
  • Attackers seek sensitive or incriminating information via intercepted communications.

GhostNet APT

One notable example of an APT is GhostNet. Discovered in March 2009, GhostNet is considered one of the most sophisticated APTs. While its control infrastructure was largely traced to China, the Chinese government denied involvement. 

GhostNet executed attacks by sending spear-phishing emails with malicious files, leading to Trojan horse infections. Once compromised, the attacker could remotely control the infiltrated system, allowing malware downloads and full system control.

Additional reading

iso 27001 2022

ISO 27001:2022 Annex A: The New Security Controls

The world of information security never stands still, nor does ISO/IEC 27001. On October 25, 2022, this crucial standard for Information Security Management Systems (ISMS) got a major overhaul.  ISO 27001, an international compliance standard that helps organizations manage their information security management systems (ISMS) undergoes a systematic review every five years.  The update to…

List of Data Security Standards – Steps to choose one

Data security is the top concern for all organizations. Businesses are collecting and processing more data than ever before. As a result, data breaches are on the rise as well.  While 45% of breaches were due to external malicious activities, 22% were credited to casual errors within the organization. That percentage is a lot of…
HIPAA data retention

HIPAA Data Retention Requirements: State-Wise Policies

Health care services that are privy to protected health information (PHI) and facility policies are legally bound to retain it in the original format throughout its lifecycle. HIPAA offers guidelines for retaining it but is often confusing and difficult to decipher. Nevertheless, HIPAA data retention laws are not to be neglected as non compliance can…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.