Advertisement

Common Cyberattacks

  • Scott E. Donaldson
  • Stanley G. Siegel
  • Chris K. Williams
  • Abdul Aslam

Abstract

When people talk about cyberattacks, they generally think about the solitary hacker, penetrating computers in far-away countries and stealing data, changing records, or doing other dastardly deeds. In reality, there is a veritable smorgasbord of cyberattacks out there that use various techniques to get into the enterprise, maintain a presence, and move around within the enterprise to accomplish the attackers’ objectives.

Keywords

Administrative Control Potential Defense Domain Name Service Virtual Desktop Code Injection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam 2015

Authors and Affiliations

  • Scott E. Donaldson
    • 1
  • Stanley G. Siegel
    • 1
  • Chris K. Williams
    • 1
  • Abdul Aslam
    • 1
  1. 1.VAUnited States

Personalised recommendations