Chapter 88: Cyber Attack Process

Nailah A. Mims     Bright Horizons, Burlington, Massachusetts, United States

Abstract

With increasing reliance on computer-based technology, cyberspace has become a critical component of 21st century life. Millions of interconnected devices allow users and systems to access cyberspace from anywhere in the world. Additionally, these devices, and the networks and infrastructure through which they communicate, regularly store, and transmit critical or sensitive data. With this growth, malicious actors have increasingly sought to compromise valuable targets like the contents of unsecured data storage, financial information, credentials, personal information, and the devices themselves. Furthermore, malicious actors have ...

Get Computer and Information Security Handbook, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.