- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 176字
- 2021-06-30 19:15:56
Sustainment
Sustainment happens when the attackers are already freely roaming in the network and copying all data that they think is valuable. They enter this stage when they want to remain undetected. There is an option to end the attack in the previous stage when data has already been stolen and can either be publicized or sold. Highly motivated attackers that want to completely finish off a target choose to continue with the attack, though. Attackers install malware, such as rootkit viruses, that assure them of access to the victim's computers and systems whenever they want.
The main aim of entering this stage is to buy time to perform another and even more harmful attack than exfiltration. The attacker is motivated to move past data and software and attack the hardware of an organization. The victim's security tools are at this point ineffective at either detecting or stopping the attack from proceeding. The attacker normally has multiple access points to the victims, such that even if one access point is closed, their access is not compromised.
- 嵌入式Linux開(kāi)發(fā)技術(shù)
- 鴻蒙生態(tài):開(kāi)啟萬(wàn)物互聯(lián)的智慧新時(shí)代
- Puppet實(shí)戰(zhàn)
- 蘋(píng)果電腦玩全攻略 OS X 10.8 Mountain Lion
- 計(jì)算機(jī)系統(tǒng)開(kāi)發(fā)與優(yōu)化實(shí)戰(zhàn)
- Windows Server 2019 Administration Fundamentals
- Social Data Visualization with HTML5 and JavaScript
- 跟老男孩學(xué)Linux運(yùn)維:Shell編程實(shí)戰(zhàn)
- AWS SysOps Cookbook
- CentOS 6 Linux Server Cookbook
- Advanced Infrastructure Penetration Testing
- bash shell腳本編程經(jīng)典實(shí)例(第2版)
- 大規(guī)模分布式系統(tǒng)架構(gòu)與設(shè)計(jì)實(shí)戰(zhàn)
- VMware vSphere 5.1 Cookbook
- 操作系統(tǒng)之哲學(xué)原理第2版