Ayo Secu

  • 홈
  • 태그
  • 방명록

initial access 1

Initial Access

Initial AccessInitial access is the phase in which attackers first gain unauthorized entry into a target environment. This stage sets the foundation for further exploitation and persistence within the system. Attackers use a variety of methods to achieve initial access, including phishing, hardware placements, supply chain compromise, and exploiting public-facing applications.1. PhishingDefiniti..

Security Terms/Attack Structure 2025.01.16
이전
1
다음
더보기
  • 분류 전체보기 (144)
    • Security Terms (144)
      • Threat Modeling (5)
      • Attack Structure (14)
      • Exploits (5)
      • Detection (11)
      • Incident Management (6)
      • Digital Forensics (7)
      • Network Security (35)
      • Web Application (22)
      • Cryptography, Authenticatio.. (8)
      • Infrastructure Virtualizati.. (9)
      • OS Implementation and Syste.. (8)
      • Mitigations (10)
      • Malware Reversing (4)

Tag

Cryptography, Detection, identity, incident management, os implementation, security, cybersecurity, Authentication, forensic, Exploit, mitigations, network, Digital Forensics, infrastructure virtualization, attack structure, threat modeling, NETWORK SECURITY, web application, security terms, systems,

Copyright © Kakao Corp. All rights reserved.

티스토리툴바