官术网_书友最值得收藏!

Summary

This chapter gave an overall picture of the phases commonly involved in cyber-attacks. It exposed the mindset of an attacker. It showed how an attacker gets details about a target using simple methods and advanced intrusion tools to later on use this information to attack users. It has discussed the two main ways through which attackers escalate their privileges when they attack systems. It has explained how cyberattackers exfiltrate data from systems that they have access to. It has also looked at scenarios where attackers proceed to attack the hardware of a victim to cause more damage. It has then discussed ways through which attackers maintain anonymity. Lastly, the chapter has highlighted ways through which users can interrupt the threat life cycle and thwart attacks.

The next chapter will take an in-depth look at reconnaissance to fully understand how attackers collect information about users and systems using social media, compromised websites, emails, and scanning tools.

主站蜘蛛池模板: 常宁市| 轮台县| 香河县| 亳州市| 北海市| 宾川县| 武义县| 荣成市| 准格尔旗| 申扎县| 惠来县| 梁河县| 新干县| 高陵县| 通化市| 长治市| 辽源市| 克东县| 德惠市| 常德市| 资阳市| 璧山县| 台中县| 桑日县| 余姚市| 华宁县| 安塞县| 洪湖市| 丰都县| 临海市| 搜索| 安平县| 赤水市| 英超| 南澳县| 安国市| 昭平县| 清徐县| 历史| 喀什市| 平塘县|