Advanced Persistent Threat (APT) — Long-Term, Coordinated Cyber Operations
An Advanced Persistent Threat (APT) refers to a highly capable and well-resourced threat actor that conducts prolonged, targeted cyber operations. This SECMONS glossary entry explains what defines an APT, how APT campaigns operate, and how defenders should assess APT-level risk.
Defense Evasion — Techniques Used to Avoid Detection and Security Controls
Defense Evasion refers to the techniques attackers use to avoid detection, bypass security controls, and remain undetected within a compromised environment. This SECMONS glossary entry explains how defense evasion works, common techniques, and how defenders can detect and counter them.
Initial Access — The First Stage of a Cyber Intrusion
Initial Access refers to the techniques attackers use to gain their first foothold inside a target environment. This SECMONS glossary entry explains common initial access vectors such as phishing, drive-by compromise, exploitation of public-facing applications, and credential abuse, and how defenders should assess and reduce exposure.
Persistence — Maintaining Long-Term Access After Initial Compromise
Persistence is the stage of an intrusion where attackers establish mechanisms to maintain access to a compromised system or environment over time. This SECMONS glossary entry explains how persistence works, common techniques used by threat actors, and how defenders can detect and remove persistent footholds.
Tactics, Techniques, and Procedures (TTPs) — Understanding Adversary Behavior Patterns
Tactics, Techniques, and Procedures (TTPs) describe how threat actors operate across the attack lifecycle. This SECMONS glossary entry explains what TTPs are, how they differ from indicators of compromise, and why behavioral intelligence is critical for long-term defense.