A cyber-attack is an assault launched by cybercriminals using one or more computers against single or multiple computers or networks. A cyber-attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks. Cybercriminals use a variety of methods to launch a cyber-attack, including malware, phishing, ransomware, denial of service, among other methods.
A cyber-attack may steal, alter, or destroy a specified target by hacking into a susceptible system. Cyberattacks can range from installing spyware on a personal computer to attempting to destroy the infrastructure of entire nations. Legal experts are seeking to limit the use of the term to incidents causing physical damage, distinguishing it from the more routine data breaches and broader hacking activities. Cyberattacks have become increasingly sophisticated and dangerous.
OFFENSIVE ACTIONS USING NON KINETIC ACTIVITIES.
PenTesting
-
Physical
-
Social
-
Computer – Internet
-
Computer – Close Access
-
PCI Security Audit
-
General web security
-
Database Security
-
Cross Site Scripting
Hacking
-
Fuzzing
-
Determining if a crash is exploitable
-
0-day generation
-
Stage 1 installers
-
Stage 2 installers
-
Command and Control Networks
Specialized
-
Cell Phone
-
Wireless (802.11, Zigbee, and others)
-
SCADA
Training
-
Intelligent filtering part 2: You know that each end point device has a limited command set, and responds at a given data rate. Flag/report/log anything that deviates.