Your SlideShare is downloading. ×
Cybersecurity
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Cybersecurity

250
views

Published on

This ia an example of illustration

This ia an example of illustration


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
250
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • This is a test
  • This is a test 2
  • Transcript

    • 1. local system ADVERSARY local server core server remote system remote site
    • 2. local server core server remote system remote site local system ADVERSARY initial foothold
    • 3. local system ADVERSARY command and control initial foothold lateral exploitation towards additional sites lateral exploitation towards key resources