This table lists some of the most common incident types.
Category | Description |
---|---|
Directed attack | The attack targets a specific host. |
Lateral movement | The attack moves between hosts while searching for the device that would be the eventual target of the attack. |
Spoofing | The attack uses falsified data to try to disguise itself. |
Persistence | The attack tries to keep, for example, a process running on the host to monitor and acquire data. |
Privilege escalation | The attack tries to gain elevated access to the host, for example by obtaining administrator privileges with a brute force attack. |
Credentials access | The attack uses stolen credentials, for example a compromised password, to access and control the host. |
Exfiltration | The attack tries to copy or transfer data from the host. |
Source : Official F-Secure Brand
Editor by : BEST Antivirus KBS Team
(Visited 9 times, 1 visits today)