10202221 - Master - Cyber Pandemic Training Book.pdf

Types of Attacks

• Business Email Compromise

• Extortion/Sextortion/Blackmail

• Data Collection or Manipulation

• Blended HUMINT/Cyber and Insider

• Economic Espionage/IP Theft

• Critical Infrastructure Exploitation

• Destructive Cyber Attacks

Page 5

Made with FlippingBook - Online catalogs