In this chapter, we discussed why attackers are interested in your privacy and the benefits for attackers from an attacker’s point of view.
We discussed the ways that attackers use stolen data for their benefit, and how we can protect our data using technical, procedural, and physical access controls. We discussed why recovering and mitigating vulnerabilities are critical as the vulnerabilities can be used to exploit systems. When vulnerabilities are not present, attackers can create some. We looked at how the reduction of the attack surface can impact potential attacks. Overexposure increases the attack surface. Attackers use different entry points to access systems using various technologies. Bots are small programs or scripts that can infect your system and compromise the system.
In the next chapter, we will learn how attackers reveal the privacy of individuals and companies.