3.3 Some Cybersecurity Attacks and Countermeasures
Now that we understand some of the adversarial postures taken and our attack surface, let’s explore some of the attack vectors and countermeasures. Attack vectors are specific ways in which an adversary can compromise an entity, whether that is to gain unauthorized access to steal information, sabotage our infrastructure, or some other sort of malicious activity. Conversely, a countermeasure involves controls used to protect the confidentiality, integrity, and availability (C-I-A) of data and information systems and also are important for negating, deterring, and countering cyberattacks. While the number of attack vectors are increasing exponentially, we will review some of the more common vectors ...
Get Information Security Management, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.