Ayo Secu

  • 홈
  • 태그
  • 방명록

Impact 1

Impact

ImpactIn the impact phase of an attack, the attacker executes actions that disrupt, degrade, or manipulate systems and data, often to achieve specific goals such as financial gain, reputational harm, or operational disruption. The impact phase includes techniques like deleting accounts or data, encrypting files (e.g., ransomware), defacing websites, and causing denial of service (DoS) or forced ..

Security Terms/Attack Structure 2025.01.16
이전
1
다음
더보기
  • 분류 전체보기 (144)
    • Security Terms (144)
      • Threat Modeling (5)
      • Attack Structure (14)
      • Exploits (5)
      • Detection (11)
      • Incident Management (6)
      • Digital Forensics (7)
      • Network Security (35)
      • Web Application (22)
      • Cryptography, Authenticatio.. (8)
      • Infrastructure Virtualizati.. (9)
      • OS Implementation and Syste.. (8)
      • Mitigations (10)
      • Malware Reversing (4)

Tag

Detection, cybersecurity, NETWORK SECURITY, infrastructure virtualization, Cryptography, os implementation, web application, network, forensic, threat modeling, systems, Digital Forensics, identity, security, security terms, mitigations, attack structure, Exploit, incident management, Authentication,

Copyright © Kakao Corp. All rights reserved.

티스토리툴바