O'Reilly logo

Cyber Security: A practitioner's guide by David Sutton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

3 CYBER TARGETS

With any large network, persistence and focus will get you in.

Rob Joyce, Tailored Access Operations, NSA, USA, 2016

In this chapter, we shall examine the various potential targets of cyber-attacks. I have tried to separate the various types of organisations into the following categories since the motives for these attacks may vary:

individuals;

businesses;

critical national infrastructure (CNI);

buildings;

academia and research;

manufacturing and industry.

INDIVIDUAL TARGETS

Whether we like it or not, we are all potentially the target of cyber-attacks. In the case of individuals, attack is most likely to come from cyber criminals who may not target us directly, but they will certainly do so as part of a larger plan ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required