官术网_书友最值得收藏!

Sustainment

Sustainment happens when the attackers are already freely roaming in the network and copying all data that they think is valuable. They enter this stage when they want to remain undetected. There is an option to end the attack in the previous stage when data has already been stolen and can either be publicized or sold. Highly motivated attackers that want to completely finish off a target choose to continue with the attack, though. Attackers install malware, such as rootkit viruses, that assure them of access to the victim's computers and systems whenever they want.

The main aim of entering this stage is to buy time to perform another and even more harmful attack than exfiltration. The attacker is motivated to move past data and software and attack the hardware of an organization. The victim's security tools are at this point ineffective at either detecting or stopping the attack from proceeding. The attacker normally has multiple access points to the victims, such that even if one access point is closed, their access is not compromised.

主站蜘蛛池模板: 行唐县| 尖扎县| 天津市| 临清市| 广昌县| 无锡市| 连平县| 昔阳县| 邓州市| 南昌市| 宜都市| 莫力| 文化| 威海市| 高清| 杭锦旗| 长武县| 屯门区| 汉沽区| 尼木县| 渑池县| 新邵县| 阿拉善右旗| 福鼎市| 鹤壁市| 江都市| 类乌齐县| 肇东市| 三台县| 裕民县| 芷江| 灵璧县| 冷水江市| 屏南县| 肇源县| 拜泉县| 密云县| 浙江省| 进贤县| 天津市| 吉林省|