1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IDG Contributor Network: Components of modern hacking operations

Discussion in 'Network World' started by RSS, May 31, 2016.

  1. RSS

    RSS New Member Member

    During my conversations with security executives, a topic that consistently comes up is what, exactly, constitutes a modern hacking operation. Security professionals understand they’re no longer facing script kiddies who lack a comprehensive plan. However, they’re also not fully aware of how detail-oriented adversaries are when developing an attack campaign.

    Today’s hacking operations are well-organized and developed by well-funded teams of highly trained adversaries who have diverse experiences and backgrounds. In fact, attack planning is handled like a business operation and includes hiring plans, budgets and timelines.

    To help security professionals better understand the attacks they’re facing, I thought I’d share some of my observations on the work that goes into planning a hack.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page