1. Cisco Systems, Inc., "What Is an Advanced Persistent Threat (APT)?". Cisco Umbrella Documentation. This official Cisco resource defines an APT as "a targeted cyberattack in which an unauthorized person gains access to a network and stays there undetected for a long period of time." It emphasizes the goals of monitoring and data theft over causing damage.
Reference: Cisco Umbrella, "What Is an Advanced Persistent Threat (APT)?", Section: "How do APTs work?".
2. Chen, P., Desmet, L., & Huygens, C. (2014). "A Study on Advanced Persistent Threats". In IFIP International Conference on Communications and Multimedia Security (pp. 63-72). Springer, Berlin, Heidelberg. This academic paper defines an APT on page 64, Section 2, as a threat that is "advanced, persistent, and has a specific target." It highlights that APTs are not single events but concerted human efforts over a prolonged period.
DOI: https://doi.org/10.1007/978-3-662-44885-45
Reference: Page 64, Section 2, Paragraph 1.
3. Massachusetts Institute of Technology (MIT) OpenCourseWare., "6.858 Computer Systems Security, Fall 2014". Lecture notes from this course discuss various threat models. Lecture 1, "Threat models," introduces the concept of sophisticated, well-funded attackers (like nation-states) who engage in targeted, long-term campaigns, which is the essence of an APT, distinguishing them from opportunistic or automated attacks.
Reference: MIT OCW, 6.858 Computer Systems Security, Fall 2014, Lecture 1 Notes, Section on "Threats."