This table lists some of the most common incident types.

Category Description
Directed attack The attack targets a specific host.
Lateral movement The attack moves between hosts while searching for the device that would be the eventual target of the attack.
Spoofing The attack uses falsified data to try to disguise itself.
Persistence The attack tries to keep, for example, a process running on the host to monitor and acquire data.
Privilege escalation The attack tries to gain elevated access to the host, for example by obtaining administrator privileges with a brute force attack.
Credentials access The attack uses stolen credentials, for example a compromised password, to access and control the host.
Exfiltration The attack tries to copy or transfer data from the host.

Source : Official F-Secure Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

(Visited 7 times, 1 visits today)