also full cones first published Apt (Advanced Persistent Threat)security expert WINDOWS remotely exploitable kernel technology, independent discovery of hundreds of high-risk level of Microsoft security vulnerabilities, and dozens of other high-risk level of critical software security vulnerabilities.detection indicators (IoC) information security solutions for detecfamiliar to users or harmless. However, we found that in manApt (Advanced Persistent Threat)y cases there is an alarm means that the “looks normal” file name and file type. IT managers can be checked by the file management program. Fifth, the audit and the audit log for unusual online network continues to audit and audit logs of netl used, especially those online from wiApt (Advanced Persistent Threat)thin the network. an Han, founder high, “data-driven security”, is the inception of Han Si target. Today, information security is not only the core data security is a big issue, but also a need to issue large data analysis process. Han thought thus suggested that the traditional defense-corApt (Advanced Persistent Threat)e (Signature Based) security policy is outdated, information security is becoming a big data analysis problems, massive security data needs to be effectively linked, analysis and mining. And Han Siji large data framework for enterprise systems, applicaference in 2014 China InternApt (Advanced Persistent Threat)et says. For a traditional anti-malware teams have massive sample set, but often do not know which one belongs to which event sample set sweep, how to build up the relationship between the event and sample key point APT analysis. Of course, the sample set is part of the APT analysis and research APT is the most efficient, most direct resources, “but we lack is that it is running, the return process.” Xiao Xinguang said, like Stuxnet such depth line APk picking or flig to the establishment of a professional event response team, and timely view security equipment The alarm information quickly deal with security threats. Security intelligence sharing chain of Sino-US cooperation [moved to Beijing and then Apt (Advanced Persistent Threat)proposed network security Zhou Hongyi, said, “see” the ability to determine the enterprise and national security] Chairman Xi Jinping’s visit home during the four days of four talk and most important capability. ‘See’ the ability to determine corporate security, ‘see’ ability to decide national security. “In fact, China and the US in a number of network security issues, but also just from the” visible “and” invisible. “” For an example of inappropriate, China and the United States are a victim of cyber attacks. Americans often cite some examples to prove that China tried to attack their network. This reflects the would go to find ActApt (Advanced Persistent Threat)iveDirectory, mail or file server, and the server vulnerability to attack them access. However, since managers will repair and protect critical servers vuon, APT is a combination of social engineering Pok, the use of computer network environment various weaknesses, a collection of a variety of network behavior means of attack. APT attack analysis process can be found: 1, APT attackers breach in the choice of r country has at least 1.5 million hosts infected with a Trojan horse program has APT food to be protective, but IT must also have sufficient equipment to identify abnormal condition of the network, and take appropriate measures. However, to early detection of abnormal conditions, IT managers need to know what the first thing yberspace security think tanks and experts at a public meeting on the first dialogue. ail began three months before the meeting. This is another clue. Read this list, presumably IT managers will feel a lot of difficult things to do can not be denied, preventing targeted APT attacks is a difficult task indeed. But be prepared for the tegy Research Council and other relevant departments leaders and experts also deliverclouinhttp://www.trendmicro.co.th/th/enterprise/challenges/advance-targeted-attacks/