Anti-Exploitation Features

Abstract: Cyber attackers want access to your sensitive information or intellectual property for strategic advantage, or more commonly, for monetary gain. They commonly attempt to exploit vulnerabilities in your computer system and network by using malware delivered via email or web servers.

Date Published:

Last Reviewed: 15 June 2015

Identifier: MIT-009FS-2013

Dissemination Control: N/A

Length: 2 page(s)

Format: pdf

Type: Reference/Overview

Tags: Anti-Exploitation; Enhanced Mitigation Experience Toolkit - EMET; Top Mitigation Strategies; Mitigations