Cybersecurity Fundamentals — Hard
Key points
- Attackers use lateral movement to expand their control within a network.
- This step allows them to escalate privileges and access critical data.
- Lateral movement is a key stage in the progression of a cyberattack.
Ready to go further?
Related questions
