English, asked by khurshidmalikdtl, 5 months ago


Which of the following is not done by cyber criminals? *



Unauthorized account access

Mass attack using Trojans as botnets

Email spoofing and spamming

Report vulnerability in any system

Answers

Answered by RajatPanwar706
6

Explanation:

When cyber attackers strategize their way to infiltrate an ­organization’s network and exfiltrate data, they follow the series of stages that comprise­ the attack lifecycle. For attackers to successfully complete an attack, they must progress through each stage. Blocking adversaries at any point in the cycle breaks the chain of attack. To protect a ­company’s network­ and data from attack, prevention must occur at each stage to block the attackers’ ability to access and move laterally within the organization or steal sensitive data. The following are the different stages of the attack lifecycle­ and steps that should be taken to prevent an attack at each stage.

1. Reconnaissance: During the first stage of the attack lifecycle, cyber adversaries carefully plan their method of attack. They research, identify and select targets that will allow them to meet their objectives. Attackers gather intel through publicly available sources, such as Twitter, LinkedIn and corporate websites. They will also scan for vulnerabilities that can be exploited within the target network, services, and applications, mapping out areas where they can take advantage. At this stage, attackers are looking for weaknesses based on the human and systems perspective.

Perform continuous inspection of network traffic flows to detect and prevent port scans and host sweeps.

Implement security awareness training so users are mindful about what should and should not be posted – sensitive documents, customer lists, event attendees, job roles and responsibilities (i.e., using specific security tools within an organization), etc.

Answered by pawandiwate123
0

Answer:

Unauthorized account access

Similar questions