Page 35 - 2023 PPIAC RMIC BOOK
P. 35

ATTACK STRATEGIES





                               •“Give-away” at a conference

                               •Switch while unattended


                               •Drop along sidewalk used for employee access

                               •Direct mail to targeted executives / employees


                                   • Identify off web site/internet

                               •Coopt an insider (social engineering, threat, bribe)
                                                                                              TSS




















                                            THREAT  VECTORS







                            •Malware / spyware / ransomware

                            •RAT – Remote Access Tools


                            •Destruction of the computer (sabotage)

                            •“Flavor of the day”




                                                                                              TSS
   30   31   32   33   34   35   36   37   38   39   40