When people talk about cyberattacks, they generally think about the solitary hacker, penetrating computers in far-away countries and stealing data, changing records, or doing other dastardly deeds. In reality, there is a veritable smorgasbord of cyberattacks out there that use various techniques to get into the enterprise, maintain a presence, and move around within the enterprise to accomplish the attackers' objectives.
CITATION STYLE
Donaldson, S. E., Siegel, S. G., Williams, C. K., & Aslam, A. (2015). Common Cyberattacks. In Enterprise Cybersecurity (pp. 281–295). Apress. https://doi.org/10.1007/978-1-4302-6083-7_16
Mendeley helps you to discover research relevant for your work.