官术网_书友最值得收藏!

Sustainment

Sustainment happens when the attackers are already freely roaming in the network and copying all data that they think is valuable. They enter this stage when they want to remain undetected. There is an option to end the attack in the previous stage when data has already been stolen and can either be publicized or sold. Highly motivated attackers that want to completely finish off a target choose to continue with the attack, though. Attackers install malware, such as rootkit viruses, that assure them of access to the victim's computers and systems whenever they want.

The main aim of entering this stage is to buy time to perform another and even more harmful attack than exfiltration. The attacker is motivated to move past data and software and attack the hardware of an organization. The victim's security tools are at this point ineffective at either detecting or stopping the attack from proceeding. The attacker normally has multiple access points to the victims, such that even if one access point is closed, their access is not compromised.

主站蜘蛛池模板: 阳山县| 云浮市| 通河县| 工布江达县| 兴文县| 镇安县| 临洮县| 宁强县| 无极县| 松桃| 依安县| 乌审旗| 奇台县| 华阴市| 保山市| 乐业县| 任丘市| 陇南市| 昭平县| 平原县| 五寨县| 庆阳市| 洪泽县| 阿拉尔市| 广安市| 桃江县| 溧阳市| 玉门市| 泰和县| 镇原县| 洮南市| 十堰市| 公安县| 蓝田县| 宁蒗| 右玉县| 临海市| 东莞市| 拜城县| 岢岚县| 莱州市|