Typical Network Attack
1. Locate system to attack
2. Gain user access
3. Gain privileged access
4. Cover tracks
5. Install backdoor for future use
6. Engage in unauthorized activity
7. Jump to other hosts
Previous slide
Next slide
Back to first slide
View graphic version