Network Security School of Fort Knox: Part 3
Charles Herring
28 August 2012
Not all types of cyber attacks are the same. In this third installment we look at different exploit types and their delivered payloads.
The difficulty in controlling user behavior makes spear phishing a "no-brainer" for attackers. Network surviellance can detect the attack at different parts of the kill chain.
Not all types of cyber attacks are the same. In this third installment we look at different exploit types and their delivered payloads.