官术网_书友最值得收藏!

Summary

This chapter gave an overall picture of the phases commonly involved in cyber-attacks. It exposed the mindset of an attacker. It showed how an attacker gets details about a target using simple methods and advanced intrusion tools to later on use this information to attack users. It has discussed the two main ways through which attackers escalate their privileges when they attack systems. It has explained how cyberattackers exfiltrate data from systems that they have access to. It has also looked at scenarios where attackers proceed to attack the hardware of a victim to cause more damage. It has then discussed ways through which attackers maintain anonymity. Lastly, the chapter has highlighted ways through which users can interrupt the threat life cycle and thwart attacks.

The next chapter will take an in-depth look at reconnaissance to fully understand how attackers collect information about users and systems using social media, compromised websites, emails, and scanning tools.

主站蜘蛛池模板: 米泉市| 五家渠市| 句容市| 浮梁县| 杂多县| 余江县| 安康市| 东港市| 凤山市| 吴旗县| 长岭县| 平阴县| 华宁县| 隆子县| 新晃| 江陵县| 长沙市| 怀化市| 长沙市| 新巴尔虎左旗| 贵定县| 招远市| 峨山| 贵港市| 达孜县| 汉阴县| 长汀县| 阿拉善右旗| 察隅县| 阿拉善左旗| 永兴县| 天柱县| 鲁山县| 怀安县| 沅陵县| 东城区| 六盘水市| 盱眙县| 崇信县| 江孜县| 泊头市|