Understanding the Attacker's Objectives - Deepstash
Understanding the Attacker's Objectives

Understanding the Attacker's Objectives

Hackers are often hoping to achieve one of three things:

  • To steal data from inside the cluster.
  • To harness the computational power of the cluster (e.g. cryptocurrency mining).
  • To cause a distributed denial of service (DDoS) attack.

1

0 reads

CURATED FROM

IDEAS CURATED BY

mike.berggren

Cybersecurity geek, engineering nerd, productivity enthusiast, devops wannabe, and sci-fi addict.

K8 security is a very broad/deep topic but here are some general best practices and considerations.

Similar ideas to Understanding the Attacker's Objectives

Avoid common scams

Freelancers often work in public spaces like coffee shops and libraries.

  • Connecting to the wrong Wi-Fi network could cause you to fall victim to the man-in-the-middle attack. This is a fake Wi-Fi network that seems free or matches closely to a real network. When you connect, you are at...

Computational Artefacts

  • The modern computer is a hierarchically organized system of computational artefacts.
  • Hierarchical organization is a means of managing the complexity of an entity.
  • Computational artefacts are made things; they process symbol structures signifying information,...

Bankroll a Service

FreeBitco.in  is one of the longest running services in cryptocurrency.

It started life as a simple ‘faucet’ service, where users could claim free coins every hour and save up enough to withdraw as a way to learn about crypto without putting an...

Read & Learn

20x Faster

without
deepstash

with
deepstash

with

deepstash

Personalized microlearning

100+ Learning Journeys

Access to 200,000+ ideas

Access to the mobile app

Unlimited idea saving

Unlimited history

Unlimited listening to ideas

Downloading & offline access

Supercharge your mind with one idea per day

Enter your email and spend 1 minute every day to learn something new.

Email

I agree to receive email updates