Hacking
Thomas Liedtke ()
Chapter Chapter 6 in Information Security, 2024, pp 133-147 from Springer
Abstract:
Abstract This chapter discusses the mindset of hackers and attackers. Attackers can be divided into different groups in terms of their motivation and abilities. Examples of attacks are given, as well as procedures (such as the Cyber-Kill-Chain) that attackers use are explained.
Date: 2024
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-3-658-45711-2_6
Ordering information: This item can be ordered from
http://www.springer.com/9783658457112
DOI: 10.1007/978-3-658-45711-2_6
Access Statistics for this chapter
More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().