CHAPTER 2: TYPES OF ATTACK

The controls set out in the Cyber Essentials requirements document5 will provide security to organisations of all sizes but have been chosen because they are relatively easy to implement for smaller organisations, and they protect against a wide variety of common cyber threats. But what are the attacks that your organisation faces?

The image of the hacker in popular media is usually of a lone individual in a basement, tapping away at a keyboard, trying to break into a specific computer system. This is no longer how most hackers work. Hacking is a business and cyber criminals are interested in getting efficient returns. A targeted attack methodology is not often efficient, which is lucky because it is difficult to keep ...

Get Cyber Essentials - A guide to the Cyber Essentials and Cyber Essentials Plus certifications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.