Index
A
Abuse.ch, 105
Access control, 90–91
Linux servers, 91
Microsoft Active Directory, 91
Using VLANs and, 91
Adobe Acrobat, 42
Advanced Research Projects Agency (ARPA), 2
After action report (AAR) of events, 47
Agent fatigue, 67
Akamai, 7
American Registry for Internet Numbers (ARIN), 41
Analyze-and-report phase., 59
Android platform, 15
Antivirus program, 15
Antivirus systems, 14
Antivirus tool, 43
Asset discovery, 79
scans, 78
systems, 78
tools, 78
Asset management, 78
actual exploitation, 42
HTTP and the C&C protocol, 43
installation, 43
Attack, flowchart ...
Get Building an Intelligence-Led Security Program now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.