Further reading
The following are resources that can be used to gain more knowledge on this chapter:
- https://www.youtube.com/watch?v=owEVhvbZMkk.
- https://www.forcepoint.com/cyber-edu/data-exfiltration.
- https://www.bleepingcomputer.com/news/security/suntrust-bank-says-former-employee-stole-details-on-15-million-customers/.
- https://www.theverge.com/2019/7/8/20685830/british-airways-data-breach-fine-information-commissioners-office-gdpr.
- https://blogs.technet.microsoft.com/markrussinovich/2011/03/26/analyzing-a-stuxnet-infection-with-the-sysinternals-tools-part-1/.
- https://arstechnica.com/information-technology/2019/04/serious-flaws-leave-wpa3-vulnerable-to-hacks-that-steal-wi-fi-passwords/.