185990691-Anatomy-of-an-Attack

185990691-Anatomy-of-an-Attack - Anatomy of a Cyber Attack...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Anatomy of a Cyber Attack Tactical Security Studies chuksjonia.blogspot.com Nairobi, Kenya By Gichuki John
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
About Me • Security Analyst • Specialize in Penetration Testing Forensics Surveillance Red Team Assessment Chuksjonia.blogspot.com Behavior Analysis Clandestine recovery Covert Data Acquisition Malware Development and Analysis Exploit Development October 2013 2
Background image of page 2
Penetration Testing • The means to identify the presence of points where something can find or force its way into or through something else. • IT Security Penetration Testing: – This is most often used to positively identify points of vulnerabilities – Determine the genuineness of the vulnerabilities that they identify by use of exploitation. – Findings that cannot be exploited are either not reported or are reported as theoretical findings when justified • Testing and Uses These are mostly commonly applied to Networks, Web Applications and physical Security. In theory, anything can undergo a Penetration Test.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 15

185990691-Anatomy-of-an-Attack - Anatomy of a Cyber Attack...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online