Integrated Attack Strategy

Integrated attack strategies involve combining hacking computer systems with attack vectors such as: espionage, blackmail, medical/health attacks, asymmetric “guerrilla-style” attacks, weapons of mass destruction, and conventional kinetic military attacks.

The video below shows an example using a medical vector, and an unprotected printer, to compromise patient and identity records that can be used in future attacks or simply sold on the black market.

The Wolf: The Hunt Continues Starring Christian Slater Presented by HP Studios | HP

– []

How Real Hacking Works
Defending Against APT
Cyber Attack Psychology
Cyberwar Defined
Attack vs Defense

Comments are closed.