Title: Hackers engage in a series of activities when breaking into and compromising a computer network or ... Post by: lbelcher on Aug 11, 2019 Hackers engage in a series of activities when breaking into and compromising a computer network or system. In this stage of an attack, the hacker deletes or modifies logs and disguises any malicious software that was used to gain access to the system:
▸ Covering their tracks ▸ Creating back doors ▸ Initial attack ▸ Information gathering Title: Hackers engage in a series of activities when breaking into and compromising a computer network or ... Post by: vande746 on Aug 11, 2019 Content hidden
|