Cyber attack methods explained, with a twist!
Learn about the ways in which cyber criminals attack businesses, using Arthurian legend analogies.
STORM Guidance have put together an interactive presentation outlining the methods cyber criminals use to compromise businesses. To keep things interesting, we're using analogies from Arthurian legend as a general theme.
In this presentation we cover the key methods of attack, including:
Remote Access Trojans (RAT)
Advanced Persistent Threats (APT)
Distributed Denial of Service (DDoS)
Business Email Compromise (BEC)
Check out the presentation below:
Note: This is best viewed on a desktop. For a fuller experience, set your browser to full screen.