list phases of a computer attack
DESCRIPTION
itt techTRANSCRIPT
LIST PHASES OF A COMPUTER ATTACK1LIST PHASES OF A COMPUTER ATTACK2
NT-2580: UNIT 9List Phases of a Computer AttackDaniel RossITT Technical Institute
Reconnaissance - Is the first and usually the longest phase that will take place. Some examples in helping with this phase are Internet searches, social engineering, and Non-intrusive network scanning. Also shadowing employees. Learning their habits and schedule. Dumpster diving is another one but not as effective as it once was since most companies now shred their documents.