August 2019
Intermediate to advanced
342 pages
9h 35m
English
Given the enormous variety of combinations that we can identify by putting together different features, it is inevitable that we have to resort to a threat model that reflects the level of risk to which a given organization is subjected, and on the basis of this model, to identify the most representative feature of combinations for possible attacks.
In this sense, it can be useful to analyze which are the most frequent types of network attacks:
On the basis of a similar classification (to be adapted to the specific context and constantly updated), we ...
Read now
Unlock full access