Ayo Secu

  • 홈
  • 태그
  • 방명록

defense evasion 1

Defense Evasion

Defense EvasionIn the defense evasion phase, attackers use techniques to avoid detection, hide their presence, and maintain control over a compromised system. These tactics allow them to bypass security mechanisms, avoid forensic analysis, and prolong their access within the target environment. Key methods of defense evasion include disabling detection software, reverting VM/cloud instances, and..

Security Terms/Attack Structure 2025.01.16
이전
1
다음
더보기
  • 분류 전체보기 (144)
    • Security Terms (144)
      • Threat Modeling (5)
      • Attack Structure (14)
      • Exploits (5)
      • Detection (11)
      • Incident Management (6)
      • Digital Forensics (7)
      • Network Security (35)
      • Web Application (22)
      • Cryptography, Authenticatio.. (8)
      • Infrastructure Virtualizati.. (9)
      • OS Implementation and Syste.. (8)
      • Mitigations (10)
      • Malware Reversing (4)

Tag

systems, threat modeling, security terms, web application, Authentication, infrastructure virtualization, Digital Forensics, Exploit, NETWORK SECURITY, incident management, forensic, security, identity, Cryptography, attack structure, network, cybersecurity, mitigations, Detection, os implementation,

Copyright © Kakao Corp. All rights reserved.

티스토리툴바