官术网_书友最值得收藏!

Summary

This chapter gave an overall picture of the phases commonly involved in cyber-attacks. It exposed the mindset of an attacker. It showed how an attacker gets details about a target using simple methods and advanced intrusion tools to later on use this information to attack users. It has discussed the two main ways through which attackers escalate their privileges when they attack systems. It has explained how cyberattackers exfiltrate data from systems that they have access to. It has also looked at scenarios where attackers proceed to attack the hardware of a victim to cause more damage. It has then discussed ways through which attackers maintain anonymity. Lastly, the chapter has highlighted ways through which users can interrupt the threat life cycle and thwart attacks.

The next chapter will take an in-depth look at reconnaissance to fully understand how attackers collect information about users and systems using social media, compromised websites, emails, and scanning tools.

主站蜘蛛池模板: 新宁县| 梅河口市| 乌兰县| 共和县| 乌苏市| 彩票| 宣城市| 祁东县| 五指山市| 喀喇沁旗| 托克逊县| 横峰县| 静乐县| 双柏县| 巴彦县| 遵义县| 章丘市| 育儿| 方山县| 昔阳县| 泰顺县| 柳江县| 阜南县| 曲水县| 精河县| 普兰县| 赣州市| 五家渠市| 平顶山市| 汾阳市| 黄冈市| 三明市| 萨嘎县| 清水河县| 双流县| 高陵县| 龙岩市| 鸡泽县| 会昌县| 邵阳市| 韶关市|