Unit 2
Threat Actors
We need to create profiles of the different types of attacks we see. Historically, cybersecurity ...
General Attack Strategies
What are the most common methods attackers use to conduct an exploit? Attack Strategy Descript...
General Defense Strategies
What are the common methods organizations use to defend their systems from attacks? Methodolog...
Attack Surfaces
All the points at which a malicious actor could try to exploit a vulnerability. Any location or m...
Social Engineering
Use Loki's tactics to convince unsuspecting users to provide sensitive data or to violate securit...
Malware
Software that serves a malicious purpose, typically installed without the user's consent (or know...