![]() |
Cyber Security Landscape
|
*** Attack Methods - Rootkit Attack *** A rootkit is a piece of software that can be installed and hidden on your computer without your knowledge It may be included in a larger software package or installed by an attacker who has been able to take advantage of a vulnerability on your computer or has convinced you to download it (see Avoiding Social Engineering and Phishing Attacks for more information) Rootkits are not necessarily malicious, but they may hide malicious activities. Attackers may be able to access information, monitor your actions, modify programs, or perform other functions on your computer without being detected
|
![]() |
Mapped Buisness Risks | ||||||
Brand Damage | Data/Secret Loss | Service Disruption |
Mapped Cyber Risks | ||||||
Extortion | Human Error | Basic Security Hygiene |
Mapped Mitigation Methods | ||||||
Limit & Control Access | Protect Data | Manage Risks, Compliance and Controls | Block Threats & Attacks | Manage Threats & Vulnerabilities | Enable Visibility |
Mapped Products | ||||||
Cyberark Alero | Okta Advanced Server Access |
Mapped OEMs | ||||||
Cyberark | Okta |