August 2018
Intermediate to advanced
512 pages
17h 18m
English
• 6.1.3 Attacker Resources and Defender Resources
• 6.2 Assume Smart Adversaries
• 6.3 Assume Adversaries Don’t Play Fair
• 6.3.1 Going Around Security Controls
• 6.3.2 Going Beneath Security Controls
• 6.3.3 Attacking the Weakest Link
• 6.3.4 Violating a Design Assumption
• 6.3.5 Using Maintenance Modes
• 6.3.6 Using Social Engineering
• 6.3.7 Using Bribery and Blackmail to Subvert Insiders
• 6.3.8 Taking Advantage of Temporary Bypasses