Network Lateral Movement (original) (raw)

About DBpedia

Network Lateral Movement, or simply Lateral Movement, refers to the techniques that cyber attackers, or threat actors, use to progressively move through a network as they search for the key data and assets that are ultimately the target of their attack campaigns. While development of more sophisticated sequences of attack has helped threat actors develop better strategies and evade detection as compared to the past, similar to planning a heist, cyber defenders have also learned to use lateral movement against attackers in that they use it to detect their location and respond more effectively to an attack.

Property Value
dbo:abstract Network Lateral Movement, or simply Lateral Movement, refers to the techniques that cyber attackers, or threat actors, use to progressively move through a network as they search for the key data and assets that are ultimately the target of their attack campaigns. While development of more sophisticated sequences of attack has helped threat actors develop better strategies and evade detection as compared to the past, similar to planning a heist, cyber defenders have also learned to use lateral movement against attackers in that they use it to detect their location and respond more effectively to an attack. (en)
dbo:wikiPageID 51295302 (xsd:integer)
dbo:wikiPageLength 1246 (xsd:nonNegativeInteger)
dbo:wikiPageRevisionID 1059705086 (xsd:integer)
dbo:wikiPageWikiLink dbr:Computer_network dbr:Theft dbc:Cybercrime dbr:Threat_actor
dbp:wikiPageUsesTemplate dbt:Reflist dbt:Short_description dbt:Security-stub
dct:subject dbc:Cybercrime
rdfs:comment Network Lateral Movement, or simply Lateral Movement, refers to the techniques that cyber attackers, or threat actors, use to progressively move through a network as they search for the key data and assets that are ultimately the target of their attack campaigns. While development of more sophisticated sequences of attack has helped threat actors develop better strategies and evade detection as compared to the past, similar to planning a heist, cyber defenders have also learned to use lateral movement against attackers in that they use it to detect their location and respond more effectively to an attack. (en)
rdfs:label Network Lateral Movement (en)
owl:sameAs wikidata:Network Lateral Movement https://global.dbpedia.org/id/2cXqD
prov:wasDerivedFrom wikipedia-en:Network_Lateral_Movement?oldid=1059705086&ns=0
foaf:isPrimaryTopicOf wikipedia-en:Network_Lateral_Movement
is dbo:wikiPageRedirects of dbr:Network_lateral_movement
is dbo:wikiPageWikiLink of dbr:Cyber_threat_hunting dbr:Network_lateral_movement
is foaf:primaryTopic of wikipedia-en:Network_Lateral_Movement