From a cyber adversary standpoint, an attacker will often maintain access and persistence in a network by using a technique known as command and control (C&C), which allows an adversary - or their piece of malware - to "call back" to another command server to receive additional instructions or execute certain actions by the adversary, for instance install additional software/malware that can be further used to accomplish the goals of the attacker.
To combat this, there are many ways that network defenders can prevent command and control traffic within their network. To start, a robust security system should always take into account how to restrict access to only those who need it (authorised) for both physical and ...
See More From: computerweekly.com ( Internet & Websites )
Dec 13, 2018 11:12 PM 4+ mon ago