As a defender, which of these attack phases is most important to understand and be able to defend against? Why

Discussion boards are collaborative learning experiences. Therefore, students will participate in eight Discussion Board Forums. Threads must be at least 300 words integrating two biblical principles.

Our text describes phases of an attack (we will visit more specifically in module 5), and we’ll be discussing all those phases in this course. Although the phases from the text represent a generalized attack framework, any sophisticated attacker that wants to remain successful will have to follow, basically, these steps. As a defender, which of these attack phases is most important to understand and be able to defend against? Why?

You must include at least one scholarly citation. This is not a “book report”, so please use your citation to underpin your understanding of the subject matter but do not simply summarize your source. You are also not allowed to use quotations from your source, nor are you allowed to plagiarize.

The Textbook is CEH v10 Certified Ethical Hacker Study Guide

Author:

 

Ric Messier

 

(From The Text Book) Getting into a system is not the end of the road in the real world. As more organizations get a handle on the modern attack space, many talks about an attack life cycle that helps to understand what phase an attacker is in. The life cycle is primarily about knowing how to respond once the attack has been detected. It also helps to plan and prepare. One approach to the life cycle uses the following phases:

 

1. Initial Reconnaissance. The attacker is performing recon on the target to determine best methods of attack and what may be available at the target worth gaining access to.

 

2. Initial Compromise. The attacker has gained access in the organization, whether through a phishing attack or an application compromise. They are in the network.

 

 

3. Establish Foothold. The attacker will have gained access previously, but here they strengthen their position. This may come from installing a means to get back in anytime they want without having to rely on the initial compromise vector. This may also involve establishing a command-and-control mechanism.

 

4. Escalate Privileges. The attacker will start harvesting credentials at this point. They will also try to gain higher-level privileges where they can.

 

 

5. Internal Reconnaissance. The attacker will get the lay of the land internally and identify other systems that they may be able to compromise.

 

6. Move Laterally. The attacker will compromise other systems in the environment in order to acquire more systems, credentials, and data.

 

 

7. Maintain Presence. The attacker will continue to establish the means to gain access to systems in the environment.

 

8. Complete Mission. The attacker will take data out of the environment.

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more