Cyber Security Defense Life Cycle - چرخه دفاع امنیت سایبری
Collecting and archiving attack artifacts, including incidents, tactics, targeting data, and loss assessments
Associating archived artifacts with the stages of the cyber attack lifecycle
Tracking environmental influences, including politics, technology developments, vulnerabilities, and exploits from both open and sensitive sources
Conducting malware reverse engineering to statically and dynamically analyze the characteristics and behavior of malicious software
Analyzing the data collected to generate hypotheses about adversaries, their intentions, and their tactics, techniques, and procedures
Drawing on all of these elements to shape and prioritize defenses and react to incidents
Defensive engagement of the threat. This concept is critical to preventing or detecting future attacks. During the early stages of the lifecycle, defenders have an opportunity to detect and mitigate threats before an adversary establishes a foothold. During the later stages, incident response and mission assurance measures are used reactively.
همه توضیحات ...