Network Lateral Movement (original) (raw)
Network Lateral Movement, or simply Lateral Movement, refers to the techniques that cyber attackers, or threat actors, use to progressively move through a network as they search for the key data and assets that are ultimately the target of their attack campaigns. While development of more sophisticated sequences of attack has helped threat actors develop better strategies and evade detection as compared to the past, similar to planning a heist, cyber defenders have also learned to use lateral movement against attackers in that they use it to detect their location and respond more effectively to an attack.
Property | Value |
---|---|
dbo:abstract | Network Lateral Movement, or simply Lateral Movement, refers to the techniques that cyber attackers, or threat actors, use to progressively move through a network as they search for the key data and assets that are ultimately the target of their attack campaigns. While development of more sophisticated sequences of attack has helped threat actors develop better strategies and evade detection as compared to the past, similar to planning a heist, cyber defenders have also learned to use lateral movement against attackers in that they use it to detect their location and respond more effectively to an attack. (en) |
dbo:wikiPageID | 51295302 (xsd:integer) |
dbo:wikiPageLength | 1246 (xsd:nonNegativeInteger) |
dbo:wikiPageRevisionID | 1059705086 (xsd:integer) |
dbo:wikiPageWikiLink | dbr:Computer_network dbr:Theft dbc:Cybercrime dbr:Threat_actor |
dbp:wikiPageUsesTemplate | dbt:Reflist dbt:Short_description dbt:Security-stub |
dct:subject | dbc:Cybercrime |
rdfs:comment | Network Lateral Movement, or simply Lateral Movement, refers to the techniques that cyber attackers, or threat actors, use to progressively move through a network as they search for the key data and assets that are ultimately the target of their attack campaigns. While development of more sophisticated sequences of attack has helped threat actors develop better strategies and evade detection as compared to the past, similar to planning a heist, cyber defenders have also learned to use lateral movement against attackers in that they use it to detect their location and respond more effectively to an attack. (en) |
rdfs:label | Network Lateral Movement (en) |
owl:sameAs | wikidata:Network Lateral Movement https://global.dbpedia.org/id/2cXqD |
prov:wasDerivedFrom | wikipedia-en:Network_Lateral_Movement?oldid=1059705086&ns=0 |
foaf:isPrimaryTopicOf | wikipedia-en:Network_Lateral_Movement |
is dbo:wikiPageRedirects of | dbr:Network_lateral_movement |
is dbo:wikiPageWikiLink of | dbr:Cyber_threat_hunting dbr:Network_lateral_movement |
is foaf:primaryTopic of | wikipedia-en:Network_Lateral_Movement |