8 Foundations_of_Cyber_Attacks Flashcards
1
Q
Steps of a Typical Cyber Attack
A
- Reconnaissance
- Scanning
- Access and Escalation
- Exfiltration
- Sustainment
- Assault
- Remove Evidence
CyberSecurity > 8 Foundations_of_Cyber_Attacks > Flashcards
Steps of a Typical Cyber Attack