Ayo Secu

  • 홈
  • 태그
  • 방명록

Impact 1

Impact

ImpactIn the impact phase of an attack, the attacker executes actions that disrupt, degrade, or manipulate systems and data, often to achieve specific goals such as financial gain, reputational harm, or operational disruption. The impact phase includes techniques like deleting accounts or data, encrypting files (e.g., ransomware), defacing websites, and causing denial of service (DoS) or forced ..

Security Terms/Attack Structure 2025.01.16
이전
1
다음
더보기
  • 분류 전체보기 (144)
    • Security Terms (144)
      • Threat Modeling (5)
      • Attack Structure (14)
      • Exploits (5)
      • Detection (11)
      • Incident Management (6)
      • Digital Forensics (7)
      • Network Security (35)
      • Web Application (22)
      • Cryptography, Authenticatio.. (8)
      • Infrastructure Virtualizati.. (9)
      • OS Implementation and Syste.. (8)
      • Mitigations (10)
      • Malware Reversing (4)

Tag

security, identity, threat modeling, systems, Exploit, Detection, NETWORK SECURITY, forensic, network, Cryptography, security terms, incident management, infrastructure virtualization, attack structure, web application, Digital Forensics, os implementation, Authentication, mitigations, cybersecurity,

Copyright © Kakao Corp. All rights reserved.

티스토리툴바