TECHNOLOGY T.ISK
MANAGEMENT
rnoiiM
_. |
1 |
_5 | ||||||||
Identities |
Communication |
Content |
Executable/Code |
Network/Media |
Traffic Type |
Encryption |
Masquerading & | ||
Steganography |
Obfuscation |
1 i |
Obfuscation |
Attack Phases |
1 >y |
* | |||
Scanning |
Anonymization of names, IP spoofing. Iccation spoofing |
Hiding scanning | |||
Gaining Access |
Hiding infection process |
Hiding infection process |
Hiding infection process |
Masquerading malicious apps | |
Maintaining Access |
Hiding C&C traffic |
Hiding data e diltration or C&C traffic, tunneling |
Hiding C&C traffic |
Masquerading processes & apps |
TECHNOLOGY RISK MANAGEMENT FORUM 2019 l 1314 CZERWCA 2019. WROCŁAW