官术网_书友最值得收藏!

Sustainment

Sustainment happens when the attackers are already freely roaming in the network and copying all data that they think is valuable. They enter this stage when they want to remain undetected. There is an option to end the attack in the previous stage when data has already been stolen and can either be publicized or sold. Highly motivated attackers that want to completely finish off a target choose to continue with the attack, though. Attackers install malware, such as rootkit viruses, that assure them of access to the victim's computers and systems whenever they want.

The main aim of entering this stage is to buy time to perform another and even more harmful attack than exfiltration. The attacker is motivated to move past data and software and attack the hardware of an organization. The victim's security tools are at this point ineffective at either detecting or stopping the attack from proceeding. The attacker normally has multiple access points to the victims, such that even if one access point is closed, their access is not compromised.

主站蜘蛛池模板: 永丰县| 丽水市| 新野县| 勃利县| 玉田县| 岳普湖县| 如皋市| 扎赉特旗| 紫云| 金堂县| 平泉县| 潼关县| 富裕县| 巴彦淖尔市| 建瓯市| 乐亭县| 方城县| 安国市| 聂荣县| 廊坊市| 满洲里市| 滨州市| 古蔺县| 罗平县| 论坛| 磴口县| 常州市| 青州市| 扶沟县| 蓝田县| 延安市| 昌都县| 蕉岭县| 嘉祥县| 邳州市| 潞城市| 兴仁县| 普定县| 资溪县| 石景山区| 库车县|