Summary
After reading this chapter, you should be more familiar with the types of threat actors that exist, and the ways that common attacks happen. You should also be aware of the dark web and how any attacker can gain sophistication through the dark web marketplace. Through our example cases, we explored how the different types of attacks can cause catastrophic damage both intentionally and through collateral damage.
In the next chapter, we will begin to discuss how an organization can protect itself. First, we will discuss some very well-known best practices that are rarely deployed. Most do not require advanced technologies, but they do require effort and thought. These often-ignored best practices can greatly decrease the likelihood of a successful attack and mitigate the damage caused, should such attacks occur.