EconPapers    
Economics at your fingertips  
 

Hacking

Thomas Liedtke ()

Chapter Chapter 6 in Information Security, 2024, pp 133-147 from Springer

Abstract: Abstract This chapter discusses the mindset of hackers and attackers. Attackers can be divided into different groups in terms of their motivation and abilities. Examples of attacks are given, as well as procedures (such as the Cyber-Kill-Chain) that attackers use are explained.

Date: 2024
References: Add references at CitEc
Citations:

There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-3-658-45711-2_6

Ordering information: This item can be ordered from
http://www.springer.com/9783658457112

DOI: 10.1007/978-3-658-45711-2_6

Access Statistics for this chapter

More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-23
Handle: RePEc:spr:sprchp:978-3-658-45711-2_6