Page 35 - 2023 PPIAC RMIC BOOK
P. 35
ATTACK STRATEGIES
•“Give-away” at a conference
•Switch while unattended
•Drop along sidewalk used for employee access
•Direct mail to targeted executives / employees
• Identify off web site/internet
•Coopt an insider (social engineering, threat, bribe)
TSS
THREAT VECTORS
•Malware / spyware / ransomware
•RAT – Remote Access Tools
•Destruction of the computer (sabotage)
•“Flavor of the day”
TSS