ABSTRACT

Every attacker does a study of the targeted environment prior to an exploit. The attacker collects some preliminary information such as the number of systems, the configurations of the systems, and the operating systems (OSs) that are used. All the information gathered builds a clear picture of the environment that is targeted. Retrospectively, it is therefore extremely important for an organization to know what information an attacker can acquire about itself and secure it so as to minimize the potential loss of this critical information.