Day 3.
What's the ultimate goal of the cyber kill chain?
- Install new device to protect the network
- Produce documentation of a possible vuln
- Identify and mitigate vulns before attack
- 5 stages of an malicious attack
Day 3.
What's the ultimate goal of the cyber kill chain?
- Install new device to protect the network
- Produce documentation of a possible vuln
- Identify and mitigate vulns before attack
- 5 stages of an malicious attack
Produce documentation/reports of/about a possible vuln or cyber attack.
It is part of a framework to identify and mitigate attacks.
Identify and mitigate vulns before attack
As
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.