To access: Get File: Anti-Exploitation Features
Abstract: Cyber attackers want access to your sensitive information or intellectual property for strategic advantage, or more commonly, for monetary gain. They commonly attempt to exploit vulnerabilities in your computer system and network by using malware delivered via email or web servers.
Date Published: 31 October 2013
Last Reviewed: 15 June 2015
Dissemination Control: N/A
Length: 2 page(s)