- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 156字
- 2021-06-30 19:15:57
Summary
This chapter gave an overall picture of the phases commonly involved in cyber-attacks. It exposed the mindset of an attacker. It showed how an attacker gets details about a target using simple methods and advanced intrusion tools to later on use this information to attack users. It has discussed the two main ways through which attackers escalate their privileges when they attack systems. It has explained how cyberattackers exfiltrate data from systems that they have access to. It has also looked at scenarios where attackers proceed to attack the hardware of a victim to cause more damage. It has then discussed ways through which attackers maintain anonymity. Lastly, the chapter has highlighted ways through which users can interrupt the threat life cycle and thwart attacks.
The next chapter will take an in-depth look at reconnaissance to fully understand how attackers collect information about users and systems using social media, compromised websites, emails, and scanning tools.
- pcDuino開發實戰
- Puppet實戰
- 精解Windows8
- Installing and Configuring Windows 10:70-698 Exam Guide
- Application Development in iOS 7
- Hands-On UX Design for Developers
- Building Telephony Systems With Asterisk
- iOS 10 開發指南
- Mastering Sass
- Implementing Cloud Design Patterns for AWS(Second Edition)
- 電腦辦公(Windows10+Office2016)從新手到高手
- Python機器學習系統構建(原書第3版)
- 計算機操作系統(第3版)(微課版)
- Docker for Developers
- Azure Serverless Computing Cookbook