-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Incident Response for Windows
By :

In this chapter, we will take a look at the typical phases of a targeted cyber attack against Windows systems. We’ll cover the various stages involved in such an attack, such as initial access, network propagation, foothold establishment, data exfiltration, and impact. We’ll also discuss different tactics and techniques that are used by threat actors at each stage of the attack, including automated and human-operated activities. This chapter focuses on the attack life cycle from the threat actor’s perspective to facilitate the best defense approach when responding to sophisticated intrusions.
Upon having a deep understanding of the threat actor’s capabilities, motives, and objectives, cybersecurity teams can discover intrusion indicators by focusing on an enterprise-wide sweep approach rather than following the breadcrumbs.
One of this book’s authors’ main goals is to develop a strong match between...
Change the font size
Change margin width
Change background colour