Skip to main content
Welcome to the cutting edge of safety science—Learn more about our rebrand.
  • Feature Story

Before the Attack

Cyberattacks are becoming a common part of everyday life, however, many people do not know what happens behind the scenes. Johannes Bauer, Principal Security Advisor for UL, uncovers the process.

Network security web with locks inside different web holes

March 21, 2019

Today, whether from the news or personal experience, most people are all too familiar with cyberattacks. In fact, cyberattacks are becoming a common part of everyday life in our high-connected world. Despite the nearly ubiquitous nature of these malicious events, however, many people do not know what happens behind the scenes.

In his recent article for IndustryWeek, “Crash Course in How Cyberattacks Start,” Johannes Bauer, Principal Security Advisor for UL, looks at what takes place before an actual attack surfaces. First, hackers begin scouting a system to learn more about it. From there, they identify the system, search for vulnerabilities and, launch the attack. Finally, with access to a single system or device, the attacker looks for ways to move around and find additional access points.

Learn more about this process and better understand the world of cyberattacks by reading Bauer’s full article.