Useful Links
Computer Science
Cybersecurity
Data Breaches
1. Fundamentals of Data Breaches
2. The Anatomy of a Data Breach
3. Causes and Sources of Data Breaches
4. Common Vulnerabilities and Attack Vectors
5. Threat Actors and Motivations
6. Impact and Consequences of Data Breaches
7. Prevention and Mitigation Strategies
8. Incident Response and Management
9. Legal and Regulatory Frameworks
10. Analysis of Major Data Breaches
11. Future Trends and Emerging Threats
The Anatomy of a Data Breach
Cyber Kill Chain Model
Reconnaissance
Target Identification
Selecting Organizations
Selecting Individuals
Profiling Targets
Information Gathering
Open Source Intelligence (OSINT)
Social Media Reconnaissance
Network Scanning
Domain and DNS Analysis
Weaponization
Creating Malicious Payloads
Malware Creation
Custom Exploits
Packing and Obfuscation
Payload Delivery Mechanisms
Delivery
Email-Based Delivery
Phishing Emails
Spear Phishing
Business Email Compromise
Web-Based Delivery
Drive-by Downloads
Watering Hole Attacks
Compromised Websites
Physical Delivery
Infected USB Drives
Malicious CDs and DVDs
Supply Chain Delivery
Exploitation
Triggering Vulnerabilities
Software Vulnerabilities
Configuration Weaknesses
Human Vulnerabilities
Initial Compromise
Installation
Malware Implantation
Backdoors
Remote Access Tools
Rootkits
Establishing Persistence
Registry Modifications
Scheduled Tasks
Service Installation
Command and Control
Establishing Communication Channels
C2 Protocols
Domain Generation Algorithms
Encrypted Communications
Evasion Techniques
Traffic Obfuscation
Domain Fronting
Remote Manipulation
Issuing Commands
Receiving Data
Actions on Objectives
Internal Reconnaissance
Network Mapping
System Enumeration
Data Discovery
Lateral Movement
Credential Harvesting
Pass-the-Hash Attacks
Exploiting Trust Relationships
Privilege Escalation
Exploiting System Flaws
Bypassing Access Controls
Token Manipulation
Data Collection
Sensitive Data Identification
Data Staging
Data Exfiltration
Data Compression and Encryption
Exfiltration Channels
Timing and Volume Control
Previous
1. Fundamentals of Data Breaches
Go to top
Next
3. Causes and Sources of Data Breaches