Index
A
Accounts
Administrator/Root User
Advanced persistent threats (APTs)
Adware
Anonymous access
Application monitoring
Application programming interface (API)
Application-specific passwords
Application-to-application (A2A) privilege automation
API
benefits
credential management
database administrators
develop access
features
password reuse attacks
Application-to-database (A2D)
App-to-app (A2A)
Architecture, PAM
active/active
active/passive
cloud-based deployments
SeeCloud-based deployments
maturity model
on-premise deployments
paradigms
third-party failover
Artificial intelligence (AI)
Attacker vs. hacker
Attack vector
definition
firewalls and endpoint protection solutions
guessing
malware
password resets
security questions
techniques
Australian Signals Directorate (ASD)
Automate ...

Get Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.