
Mastering Defensive Security
By :

First, let's start by understanding the importance of network mapping tools.
Cyber attacks are normally composed of five phases in which network mapping is the core of the second phase, known as scanning. To better understand this, let's take a quick look at those five phases of a cyber attack.
These phases were not created as a set of best practices that attackers need to follow; instead, they were designed by cybersecurity professionals to categorize the most common steps that an attacker will be most likely to follow when performing a cyber attack.
Let me explain those stages by telling the story of an attacker that wants to gather some data from a fictional company called Bravix.
First, the attacker needs to acquire some basic information about Bravix, such as web page name, type of security, basic structure, web services in use, and so on...
Change the font size
Change margin width
Change background colour