Symantec.com > Enterprise > Advanced Persistent Threats: How They Work

Advanced Persistent Threats: How They Work

An advanced persistent threat (APT) uses multiple phases to break into a network, avoid detection, and harvest valuable information over the long term. This infographic details the attack phases, methods, and motivations that differentiate APTs from other targeted attacks.
SHARE THIS PAGE
APT
SHARE THIS PAGE

Want to use this infographic on your site? Please use the following code:



<iframe title="Advanced Peristent Threat: The Uninvited Guest" width="649" height="759" src="http://www.symantec.com/content/en/us/enterprise/images/b-apt_infographic.jpg" frameborder="0"></iframe> <br /> <a href="http://www.symantec.com/business/theme.jsp?themeid=apt-infographic-1">Advanced Persistent Threats: How They Work</a> on Symantec.com