cybersecurity
TRANSCRIPT
![Page 1: Cybersecurity](https://reader035.vdocuments.net/reader035/viewer/2022080214/55a982cd1a28ab6a458b4743/html5/thumbnails/1.jpg)
local server
core server
remote system remote site
local system
ADVERSARY
![Page 2: Cybersecurity](https://reader035.vdocuments.net/reader035/viewer/2022080214/55a982cd1a28ab6a458b4743/html5/thumbnails/2.jpg)
local server
core server
remote system remote site
local system
ADVERSARY
initialfoothold
![Page 3: Cybersecurity](https://reader035.vdocuments.net/reader035/viewer/2022080214/55a982cd1a28ab6a458b4743/html5/thumbnails/3.jpg)
local system
ADVERSARY
command command and and
controlcontrol
initialinitialfootholdfoothold
lateral exploitation towards additional sites
lateral exploitation towards key resources