Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » Generic » APT- Advanced Persistent Threat

APT- Advanced Persistent Threat

An Advanced Persistent Threat (APT) is a highly sophisticated and long-lasting cyberattack strategy. In an APT, intruders infiltrate a network covertly, aiming to steal sensitive data over an extended period while avoiding detection.

Key APT objectives:

  • APT attackers target sensitive data like credit card information, bank accounts, passport details, and more.
  • APTs may seek to disrupt an entire system, including cloud resources, by deleting crucial databases.
  • Attackers may gain control of critical websites, potentially impacting stock markets or vital services like hospitals.
  • APTs aim to access essential systems using stolen user credentials.
  • Attackers seek sensitive or incriminating information via intercepted communications.

GhostNet APT

One notable example of an APT is GhostNet. Discovered in March 2009, GhostNet is considered one of the most sophisticated APTs. While its control infrastructure was largely traced to China, the Chinese government denied involvement. 

GhostNet executed attacks by sending spear-phishing emails with malicious files, leading to Trojan horse infections. Once compromised, the attacker could remotely control the infiltrated system, allowing malware downloads and full system control.

Additional reading

Influential GRC leaders to follow in 2025

Compliance and risk management are no longer just about ticking boxes—they are a strategic necessity, a fuel for growth. To get the most out of them, you need experts to break down the complexities and nuances.  This is where GRC leaders and influencers come in—to help you make the most of your journey rather than…

FedRAMP Compliance Of AWS EC2 Instances: Should You Worry?

If you’re using AWS EC2 (Elastic Compute Cloud) for your infrastructure, you might be wondering if you need to do anything to meet the security standards for handling government data. The good news is that your cloud service provider has already taken care of that with FedRAMP (Federal Risk and Authorization Management Program). FedRAMP sets…

NIST Asset Management Beginners Guide

The biggest challenge that large organizations face is the handling of resources. This can include everything from computers, mobile devices, and other endpoint devices to operating systems, applications, data, and networks. Not knowing where each asset is or knowing how they function can prove problematic. Even more so when all of this is handled with…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.