8 hours 28 minutes
hello and welcome to another application of the minor attack framework discussion. Today, we're going to be looking at impact and the final phase in our minor attack framework.
So what is impact? Well, per miner impact is when a threat actor is attempting to manipulate, interrupt or destroy your systems and data. This can include a disruption and availability such as destroying data, a compromise or compromising integrity such as tampering with data.
And so impact is all about changing, defacing, manipulating or making something otherwise undependable inaccurate or just plain wrong.
So we will only be reviewing a few things within the impact phase. Because really, you know, if you understand two of these areas than really you'll have a good understanding of everything within the impact face. So we're going to looking be looking at account access, removal and defacement activity.
So what? That we're gonna jump right in and again, I thank you for your time today,
and I look forward to seeing you again soon.
Become an Incident Handler
In this Career Path, you will learn the incident response process, from building an incident ...
Information Security Fundamentals
The foundational networking and security concepts taught in this career path form the backbone of ...