The eagle has landed - what happens next?
详细信息    查看全文
文摘
Understanding the behaviour of attackers once the ‘eagle has landed’ – after they have penetrated your systems – is not about preventing attacks but rather focusing on what happens once hackers gain access to your networks. In the first part of this two-part article we started by reviewing the changing threat vectors and objectives. Now we look at how organisations can classify and counter these developing threats.

Understanding the behaviour of attackers after they have penetrated your systems is not about preventing attacks but rather focusing on what happens once they have access to your networks.

In this second part of a two-part article, Tracey Caldwell looks at how organisations can classify and counter developing threats. Sharing intelligence is crucial, but it's important to strike a balance between the benefit of information sharing and the risk of tipping off attackers that the organisation is on to them.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700