What is the second stage in cyber attack?
Answers
Answered by
2
Answer:
At the second phase of a cyber-attack, the attacker seeks to breach the corporate perimeter and gain a persistent foothold in the environment. They may have spear-phished the company to gain credentials, used valid credentials to access the corporate infrastructure and downloaded more tools to access the environment.
Explanation:
I hope it helps you
please mark me brainlist
Answered by
0
Answer:
At the second phase of a cyber-attack, the attacker seeks to breach the corporate perimeter and gain a persistent foothold in the environment. They may have spear-phished the company to gain credentials, used valid credentials to access the corporate infrastructure and downloaded more tools to access the environment.
Explanation:
Plz mark as brainliest..
Similar questions
Math,
25 days ago
Computer Science,
1 month ago
Computer Science,
1 month ago
English,
9 months ago
Math,
9 months ago
Math,
9 months ago