6 Internal attacks

This chapter covers

  • Understanding how attackers use multiple techniques at the same time
  • Developing security strategies to address insider threats
  • Learning why “defense in depth” is different from the traditional “perimeter security” approach
  • Learning and implementing strategies to limit the damage from an initial breach and making it easier to spot the attackers

Expanding on the technical hacks and social engineering we discussed in chapters 4 and 5, this chapter looks at the next stage: what hackers do once they have broken their way inside your organization. We’ll also look at another common attack route: insider threats.

6.1 What happens after they get in?

Back in chapter 2, we looked at the fundamental building blocks ...

Get Making Sense of Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.