A savvy defender understands that they may not be able to prevent a capable attacker from gaining an initial foothold on their network. On any real network, the collection of potential attack vectors is large, and the attacker only needs to be successful once to get that initial foothold. Even something as simple as a phishing attack can be used to obtain that initial shell.
CITATION STYLE
O’Leary, M. (2019). Defending the Windows Domain. In Cyber Operations (pp. 567–648). Apress. https://doi.org/10.1007/978-1-4842-4294-0_12
Mendeley helps you to discover research relevant for your work.