Abstract
This chapter is a more technical chapter. It outlines and analyzes a series of cyberattack measures and then discusses counters and defenses. The attacks include the use of zero-days, rootkits, and Remote Access Trojans and remote access more widely and common tactics, techniques, and procedures. The counters and defenses include Firewalls, Demilitarized Zones, Intrusion Detection Systems, and zero trust security models. It then moves onto an examination of legacy systems and patching before looking at the targeting of companies in the supply chains that make up critical infrastructure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Stoddart, K. (2022). Gaining Access: Attack and Defense Methods and Legacy Systems. In: Cyberwarfare. Palgrave Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-97299-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-97299-8_4
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-97298-1
Online ISBN: 978-3-030-97299-8
eBook Packages: Computer ScienceComputer Science (R0)