Targeted Attack

Using waterhole or spear phishing, attacker steals the access privileges for an end point with access to the target institutions network. SCIT disrupts attack and forensic analysis at end of SCIT cycle leads to early discovery.