Cyber Security Defense Life Cycle - چرخه دفاع امنیت سایبری

แชร์
ฝัง
  • เผยแพร่เมื่อ 14 ต.ค. 2022
  • Collecting and archiving attack artifacts, including incidents, tactics, targeting data, and loss assessments
    Associating archived artifacts with the stages of the cyber attack lifecycle
    Tracking environmental influences, including politics, technology developments, vulnerabilities, and exploits from both open and sensitive sources
    Conducting malware reverse engineering to statically and dynamically analyze the characteristics and behavior of malicious software
    Analyzing the data collected to generate hypotheses about adversaries, their intentions, and their tactics, techniques, and procedures
    Drawing on all of these elements to shape and prioritize defenses and react to incidents
    Defensive engagement of the threat. This concept is critical to preventing or detecting future attacks. During the early stages of the lifecycle, defenders have an opportunity to detect and mitigate threats before an adversary establishes a foothold. During the later stages, incident response and mission assurance measures are used reactively.
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น •