-
Book Overview & Buying
-
Table Of Contents
Cyber Security Kill Chain - Tactics and Strategies
By :
As this ebook edition doesn't have fixed pagination, the page numbers below are hyperlinked for reference only, based on the printed edition of this book.
Symbols
5G-enabled attacks 229
countermeasures 229
A
abuse of trust 63
distribution, through legitimate domains 63
malware signed, with legitimate certificates 63
access controls and authentication mechanisms 140
actions on objectives phase 133, 134
actions on objectives phase, CKC framework 199
legal implications 200
Active Cyber Defense Certainty Act (ACDC Act) 208
active Recon 17
adaptive threat intelligence 244
address space layout randomization (ASLR) 42, 88
Adobe Photoshop ransomware 187
advanced encryption techniques 240
homomorphic encryption 240
quantum-resistant cryptography 241
advanced malware detection 232
Advanced Package...