Maintaining access

An illicit, long-term intruder presence in a network may cause irreversible damage to the system, as they may be present in the system for a long time, which facilitates highly sensitive data mining (especially on government, military, and financial networks) in steady, well-researched, and meticulously planned attacks.

Assessing the long-term presence abilities, and the chances of them gaining in-depth access to systems/APIs is the primary intention of this Maintaining Access phase.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.147.84.169