Which of the following is the BEST control to detect an advanced persistent threat (APT)?
Click on the arrows to vote for the correct answer
A. B. C. D.B.
An advanced persistent threat (APT) is a type of targeted and sophisticated cyber-attack that aims to infiltrate a network and remain undetected for an extended period. APTs are often launched by well-funded and highly-skilled attackers who are motivated by financial gain, espionage, or sabotage.
Out of the given options, the BEST control to detect an APT is implementing automated log monitoring (Option D). Here's why:
A. Monitoring social media activities: While monitoring social media activities can help identify potential threats, it is not an effective control for detecting an APT. APT attackers are sophisticated and stealthy, and they are unlikely to expose their activities on social media. This control is more suitable for detecting social engineering attacks.
B. Conducting regular penetration tests: Penetration testing is a valuable tool for identifying vulnerabilities in a network. However, it is not designed to detect APTs. Penetration testing is a simulated attack that aims to exploit known vulnerabilities. An APT attack is designed to avoid detection and exploit unknown vulnerabilities.
C. Utilizing antivirus systems and firewalls: Antivirus systems and firewalls are essential controls for protecting against malware and unauthorized access. However, they are not designed to detect APTs. APT attackers use advanced techniques such as zero-day exploits and social engineering to bypass antivirus systems and firewalls.
D. Implementing automated log monitoring: Automated log monitoring is the BEST control for detecting an APT. APT attacks are designed to remain undetected for long periods, and they often leave subtle signs of their presence in the network logs. Automated log monitoring can help identify these signs by analyzing network logs for unusual patterns of activity or behavior. It can also help identify insider threats and detect data exfiltration attempts.
In summary, while all the given options can help strengthen the security posture of an organization, the best control to detect an APT is implementing automated log monitoring.