Institutional Affiliation

Your page rank:

Total word count: 457
Pages: 2

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant


Traditional criminal hackers when compared to modern day advance persistent thereat hackers display a wide array of differences despite their focus and drive is similar, their skills are totally different. Normally, traditional hackers would carry out a quick hacking attempt without much planning and the goal of the attack being intrusion through brute force to get data or ascertaining that a system was not secure. Usually, they would pull off one time attacks on the areas they had targeted. Advanced persistent thereat type of hackers as the name suggests are persistent, patient and stealthy (Kenley, 2014).

Advance persistent thereat hackers normally target private organizations or major states for purposes of political or business motives. They make use of techniques, which are sophisticated, and the target system is under heavy surveillance and multiple threats to analyze which one exploits the vulnerabilities of the system. Techniques used in such attacks are such as social engineering, phishing and creating backdoors into software being used by the target so that they can be able to extract the required information. The attackers place malicious lines of code within the system in an undetectable manner over time and then it is run at once to give full access and control (Tankard, 2011).

Traditional hackers are different from advance persistent thereat hackers since some might have intent of showing companies that their systems are vulnerable and that they require upgrades to make them more robust. Normally, they would work individually without many resources as compared to advanced persistent threat hackers who work in teams which are fully equipped and have numerous resources at their disposal.

Advance persistent threats are categorized by them having objectives, timelines, resources, being risk tolerant, having advanced penetration methods and skills, attacks being from certain origination points, numbers of systems both internal and external involved in the attack and the source of knowledge used to gather information regarding the target. Traditional script kiddies usually make use of already written scripts in formulation of attacks on systems. Systems should also be configured not to accept scripts from unknown sources to prevent systems being put at risk (Tankard, 2011).

Despite hacker attacks in some cases being undetectable, they can however be mitigated by putting intrusion detection systems in play and collection and analysis of system logs to detect activity originating from externally within the network (Vukalović & Delija, 2015).


Kenley, N. (2014). Hackers without borders: Global detectives in Stieg Larsson’s Millennium Trilogy. Clues, 32(2), 30-40.

Tankard, C. (2011). Advanced persistent threats and how to monitor and deter them. Network Security, 2011(8), 16-19.

Vukalović, J., & Delija, D. (2015, May). Advanced persistent threats-detection and defense. In Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2015 38th International Convention (pp. 1324-1330). IEEE.

Share This

More essays like this

Lego and Social Responsibility

ContentsIntroductionReferences Lego is a plastic toy manufacturing company owned by the Lego group. It makes pieces which can be assembled ...

Read more


ContentsIntroductionReferences Strategic Approach and Performance of the LEGO Organizations Background LEGO is a plastic toy manufacturing toy company that was ...

Read more

The Lego Group

ContentsIntroductionReferences The Lego Group is a family-owned Danish toy making company which has its headquarters in Billund, Denmark. It has ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message