Types of Attacks
• Business Email Compromise
• Extortion/Sextortion/Blackmail
• Data Collection or Manipulation
• Blended HUMINT/Cyber and Insider
• Economic Espionage/IP Theft
• Critical Infrastructure Exploitation
• Destructive Cyber Attacks
Page 5
Made with FlippingBook - Online catalogs