Attack Methods

Most attackers do not want to be discovered and so they use a variety of techniques to remain in the shadows when attempting to compromise a network, as described in Table 1-5.

Image
Image

Table 1-5 Attack Methods

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset