list phases of a computer attack

2
LIST PHASES OF A COMPUTER ATTACK 1 NT-2580: UNIT 9 List Phases of a Computer Attack Daniel Ross ITT Technical Institute

Upload: daniel-ross

Post on 23-Sep-2015

5 views

Category:

Documents


1 download

DESCRIPTION

itt tech

TRANSCRIPT

LIST PHASES OF A COMPUTER ATTACK1LIST PHASES OF A COMPUTER ATTACK2

NT-2580: UNIT 9List Phases of a Computer AttackDaniel RossITT Technical Institute

Reconnaissance - Is the first and usually the longest phase that will take place. Some examples in helping with this phase are Internet searches, social engineering, and Non-intrusive network scanning. Also shadowing employees. Learning their habits and schedule. Dumpster diving is another one but not as effective as it once was since most companies now shred their documents.