-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Cybersecurity – Attack and Defense Strategies, 3rd edition
By :

In the last chapter, you learned techniques to compromise a system. However, in the current threat landscape those techniques are often not even needed because instead, systems are simply compromised using stolen credentials. According to the 2021 Data Breach Investigation Report from Verizon, credentials are still the most prevalent data type that attackers are looking for. The same report also highlights that 61 percent of data breaches are caused by leaked credentials. This threat landscape pushes enterprises to develop new strategies to enhance the overall security aspect when it comes to a user’s identity.
In this chapter, we’re going to be covering the following topics:
We’ll start by discussing why identity came to be such a vital area to protect.
Change the font size
Change margin width
Change background colour