Current Cyber Attack Methods

Current Cyber Attack Methods

Andrew Colarik (Consultant, New Zealand)
Copyright: © 2006 |Pages: 29
DOI: 10.4018/978-1-59904-021-9.ch005
OnDemand PDF Download:
No Current Special Offers


Understand that cyber attacks are not random but instead are executed with deliberate intent and specific purpose. Ö Identify many of the internal penetration approaches to achieve security breaches. Ö Discover the most common external penetration tactics directed against systems. Ö Come to realize the part that people play in the breach of systems. Ö Recognize that there are many components that are vulnerable to attacks that are outside an individual’s or organization’s zone of control.

Complete Chapter List

Search this Book: