Chapter 84

Cyber-Attack Process

Nailah Mims     Bright Horizons


The extensive communication and information processes that occur within cyberspace has led to the corresponding spread of computer-based devices. These devices are employed by individuals, corporations, governments, schools, hospitals—and indeed nearly every organization across every sector of civilization—making the security of the associated data, or information, a high priority for those with cyberspace assets. The basis of a cyber-attack is taking what are legitimate methods of transmitting, accessing, and storing information and manipulating it for unauthorized and malicious ends. This chapter will cover the cyber-attack process, to include the technical and nontechnical ...

Get Computer and Information Security Handbook, 3rd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.