Cyber Essentials - A guide to the Cyber Essentials and Cyber Essentials Plus certifications
by Alan Calder
CHAPTER 2: TYPES OF ATTACK
The controls set out in the Cyber Essentials requirements document5 will provide security to organisations of all sizes but have been chosen because they are relatively easy to implement for smaller organisations, and they protect against a wide variety of common cyber threats. But what are the attacks that your organisation faces?
The image of the hacker in popular media is usually of a lone individual in a basement, tapping away at a keyboard, trying to break into a specific computer system. This is no longer how most hackers work. Hacking is a business and cyber criminals are interested in getting efficient returns. A targeted attack methodology is not often efficient, which is lucky because it is difficult to keep ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access