Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » Generic » APT- Advanced Persistent Threat

APT- Advanced Persistent Threat

An Advanced Persistent Threat (APT) is a highly sophisticated and long-lasting cyberattack strategy. In an APT, intruders infiltrate a network covertly, aiming to steal sensitive data over an extended period while avoiding detection.

Key APT objectives:

  • APT attackers target sensitive data like credit card information, bank accounts, passport details, and more.
  • APTs may seek to disrupt an entire system, including cloud resources, by deleting crucial databases.
  • Attackers may gain control of critical websites, potentially impacting stock markets or vital services like hospitals.
  • APTs aim to access essential systems using stolen user credentials.
  • Attackers seek sensitive or incriminating information via intercepted communications.

GhostNet APT

One notable example of an APT is GhostNet. Discovered in March 2009, GhostNet is considered one of the most sophisticated APTs. While its control infrastructure was largely traced to China, the Chinese government denied involvement. 

GhostNet executed attacks by sending spear-phishing emails with malicious files, leading to Trojan horse infections. Once compromised, the attacker could remotely control the infiltrated system, allowing malware downloads and full system control.

Additional reading

Your Complete CMMC Compliance Checklist for 2025

If you’re a defense contractor, staying compliant with the Cybersecurity Maturity Model Certification (CMMC) is important to continue working with the Department of Defense (DoD).  CMMC is expected to be finalized by late 2024 and included in contracts by early 2025, so it’s time to start preparing. To help you prepare, here’s a straightforward introduction…

6 Delve Alternatives for Compliance Automation (2025 Updated)

Delve helps teams bring compliance tasks into one place and automate parts of audit preparation. Its integrations and multi‑framework support make it a capable option for a range of businesses.  Still, even a strong platform can slow progress if it doesn’t match how your team works or where your business is headed. Choosing the wrong…

Breaking Down NIST 800-171 Controls: The Full List of Security Requirements

As long as small and mid-sized businesses can demonstrate robust security measures, the U.S. Department of Defense is more than willing to outsource innovation, ideas, and services to them. You don’t need to be a large enterprise to win federal contracts—what matters is proving that you can effectively safeguard sensitive government information from potential threats….

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.