Chapter 1

Introduction

This chapter introduces the topic of targeted attacks explaining the complete model and purpose of these attacks. This chapter lays the foundation of different phases required for successful execution of targeted attacks. Basically, the readers will get an idea of the basic model of targeted attack covering the overall idea of intelligence gathering, infecting targets, system exploitation, data exfiltration and maintaining control over the target network. This chapter also unveils the difference between targeted attacks and advanced persistent threats.

Keywords

Targeted Cyber Attacks; Advanced Persistent Threats; Cyber Crime; Cyber Espionage; Zero-day Exploits and Vulnerabilities

The exploitation of networks and technologies ...

Get Targeted Cyber Attacks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.