How attackers circumvent firewalls and antivirus: 7 common steps

Why Firewalls And Antivirus Alone Are Not Enough

Cover

Network firewalls and endpoint antivirus defenses react to malicious code after attacks have launched – but it’s becoming increasingly important to detect threats earlier and prevent attacks before they even reach fruition.

This white paper examines each step of an attack so that you can increase your understanding of how to properly prepare and enhance your defenses.

Explore 4 attacks and uncover 7 common steps attackers take to achieve their objectives, including how they:

  • Perform reconnaissance before an attack
  • Host initial payloads, malware, and botnets on multiple networks
  • Exploit both zero-day and known vulnerabilities
  • And more
Vendor:
Cisco Umbrella
Posted:
25 Jul 2017
Published:
31 Dec 2016
Format:
PDF
Length:
4 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.