What is the second stage in cyber attack?
Answers
Answered by
2
Answer:
At the second phase of a cyber-attack, the attacker seeks to breach the corporate perimeter and gain a persistent foothold in the environment. They may have spear-phished the company to gain credentials, used valid credentials to access the corporate infrastructure and downloaded more tools to access the environment.
Explanation:
I hope it helps you
please mark me brainlist
Answered by
0
Answer:
At the second phase of a cyber-attack, the attacker seeks to breach the corporate perimeter and gain a persistent foothold in the environment. They may have spear-phished the company to gain credentials, used valid credentials to access the corporate infrastructure and downloaded more tools to access the environment.
Explanation:
Plz mark as brainliest..
Similar questions
Math,
10 days ago
Math,
10 days ago
Math,
10 days ago
Computer Science,
21 days ago
Computer Science,
21 days ago
English,
8 months ago
Math,
8 months ago
Math,
8 months ago