Chapter 84

Cyber-Attack Process

Nailah Mims     Bright Horizons

Abstract

The extensive communication and information processes that occur within cyberspace has led to the corresponding spread of computer-based devices. These devices are employed by individuals, corporations, governments, schools, hospitals—and indeed nearly every organization across every sector of civilization—making the security of the associated data, or information, a high priority for those with cyberspace assets. The basis of a cyber-attack is taking what are legitimate methods of transmitting, accessing, and storing information and manipulating it for unauthorized and malicious ends. This chapter will cover the cyber-attack process, to include the technical and nontechnical ...

Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.