Ayo Secu

  • 홈
  • 태그
  • 방명록

defense evasion 1

Defense Evasion

Defense EvasionIn the defense evasion phase, attackers use techniques to avoid detection, hide their presence, and maintain control over a compromised system. These tactics allow them to bypass security mechanisms, avoid forensic analysis, and prolong their access within the target environment. Key methods of defense evasion include disabling detection software, reverting VM/cloud instances, and..

Security Terms/Attack Structure 2025.01.16
이전
1
다음
더보기
  • 분류 전체보기 (144)
    • Security Terms (144)
      • Threat Modeling (5)
      • Attack Structure (14)
      • Exploits (5)
      • Detection (11)
      • Incident Management (6)
      • Digital Forensics (7)
      • Network Security (35)
      • Web Application (22)
      • Cryptography, Authenticatio.. (8)
      • Infrastructure Virtualizati.. (9)
      • OS Implementation and Syste.. (8)
      • Mitigations (10)
      • Malware Reversing (4)

Tag

Cryptography, Authentication, threat modeling, cybersecurity, incident management, Detection, security, mitigations, attack structure, Exploit, infrastructure virtualization, NETWORK SECURITY, systems, identity, security terms, Digital Forensics, network, os implementation, forensic, web application,

Copyright © Kakao Corp. All rights reserved.

티스토리툴바