CEH Study Slides With Example and Defination
CEH Study Slides With Example and Defination
Page-40
The following areas in an organization might require more attention in terms of security:
- Encryption mechanisms
- Access control devices
- Authentication systems
- Firewalls
- Antivirus systems
- Web sites
- Gateways
- Routers and switches
What is IOC?
Any evidence left behind by an attacker or malicious software that can
be used to identify a security incident. CTI also provide -
IOCs
What are tactics, techniques, and procedures (TTPs)? TTPs
TTPs are used to describe the behaviors, strategies and methods used Campaign details
by an attacker to develop and execute cyberattacks on enterprise Mitigation guidance
networks.
https://www.slideteam.net/types-of-social-engineering-attack-with-pretexting.html
Persistence refers to the techniques and strategies
that enable continued access to a system after the
initial point of compromise.