at the end of model to let's do a short recap at what you have learned,
we have been talking about Who are the people you are defending against?
Um, what are the threats?
and how are they going to attack you? You're in points
classified by 10 points. So we talked about
all the classes off hackers of cyber criminals.
Uh, you learn that in most of the cases they just want money or some kind of monetary gain. It doesn't have to be your money exactly. But it will damage your financially anyway.
And that in very rare cases there, looking physically to damage you
in terms off, making your company non functional for a period of time or your website wherever they want to do
and is the ways of attacking they can attack you through mala where they can attack you from through. Ah, all sorts of females. Melber websites. They can just get your credential by using social engineering or look over your shoulder when you're in public space.
So basically there are many, many ways
in which they can get the information they need to successfully break through your defenses and you have to have all of that in might,
And this concludes the model, too.