CHAPTER
6 Adversaries: Know Thy Enemy
Overview
• 6.1.3 Attacker Resources and Defender Resources
• 6.2 Assume Smart Adversaries
• 6.3 Assume Adversaries Don’t Play Fair
• 6.3.1 Going Around Security Controls
• 6.3.2 Going Beneath Security Controls
• 6.3.3 Attacking the Weakest Link
• 6.3.4 Violating a Design Assumption
• 6.3.5 Using Maintenance Modes
• 6.3.6 Using Social Engineering
• 6.3.7 Using Bribery and Blackmail to Subvert Insiders
• 6.3.8 Taking Advantage of Temporary Bypasses
Get Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.