Glossary of Compliance
Compliance Glossary
Our list of curated compliance glossary offers everything you to know about compliance in one place.
APT- Advanced Persistent Threat
An Advanced Persistent Threat (APT) is a highly sophisticated and long-lasting cyberattack strategy. In an APT, intruders infiltrate a network covertly, aiming to steal sensitive data over an extended period while avoiding detection.
Key APT objectives:
- APT attackers target sensitive data like credit card information, bank accounts, passport details, and more.
- APTs may seek to disrupt an entire system, including cloud resources, by deleting crucial databases.
- Attackers may gain control of critical websites, potentially impacting stock markets or vital services like hospitals.
- APTs aim to access essential systems using stolen user credentials.
- Attackers seek sensitive or incriminating information via intercepted communications.
GhostNet APT
One notable example of an APT is GhostNet. Discovered in March 2009, GhostNet is considered one of the most sophisticated APTs. While its control infrastructure was largely traced to China, the Chinese government denied involvement.
GhostNet executed attacks by sending spear-phishing emails with malicious files, leading to Trojan horse infections. Once compromised, the attacker could remotely control the infiltrated system, allowing malware downloads and full system control.
Additional reading
How to conduct a user access review?
Understanding Cybersecurity Vulnerabilities And How They Put You At RiskÂ
Governance vs Compliance: Key Differences and Similarities

Sprinto: Your growth superpower
Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.
