Acquiring access

In access attacks an adversary exploits security weaknesses to obtain access to a system or the network. Phishing, pharming and password breaking (bruto force, dictionary, etc) are typically used to obtain system access. When access is obtained, the adversary can modify or delete data and add, modify, or remove network resources. Typical access attacks are:

  • Unauthorised system access by exploiting the vulnerabilities of operating systems or executing a script or a hacking program to obtain access to a system.
  • Unauthorised privilege escalation to obtain a high level of access, like administrative privileges, to gain control of the network system.
  • Unauthorised data manipulation involves interpreting, altering, and deleting confidential data.

Development