Introduction
This chapter introduces the topic of targeted attacks explaining the complete model and purpose of these attacks. This chapter lays the foundation of different phases required for successful execution of targeted attacks. Basically, the readers will get an idea of the basic model of targeted attack covering the overall idea of intelligence gathering, infecting targets, system exploitation, data exfiltration and maintaining control over the target network. This chapter also unveils the difference between targeted attacks and advanced persistent threats.
Keywords
Targeted Cyber Attacks; Advanced Persistent Threats; Cyber Crime; Cyber Espionage; Zero-day Exploits and Vulnerabilities
The exploitation of networks and technologies ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access