Cyber Security Defense Life Cycle - چرخه دفاع امنیت سایبری

علیرضا قهرود
علیرضا قهرود
Collecting and archiving attack artifacts, including incidents, tactics, targeting data, and loss assessments Associating archiv ...
Collecting and archiving attack artifacts, including incidents, tactics, targeting data, and loss assessments Associating archived artifacts with the stages of the cyber attack lifecycle Tracking environmental influences, including politics, technology developments, vulnerabilities, and exploits from both open and sensitive sources Conducting malware reverse engineering to statically and dynamically analyze the characteristics and behavior of malicious software Analyzing the data collected to generate hypotheses about adversaries, their intentions, and their tactics, techniques, and procedures Drawing on all of these elements to shape and prioritize defenses and react to incidents Defensive engagement of the threat. This concept is critical to preventing or detecting future attacks. During the early stages of the lifecycle, defenders have an opportunity to detect and mitigate threats before an adversary establishes a foothold. During the later stages, incident response and mission assurance measures are used reactively.

همه توضیحات ...