Posts

Showing posts from November, 2019

Understanding Indicators of Compromise

Image
The Indicators of Compromise play a serious role in building and enhancing the cyber security posture of a company. Monitoring IOCs helps analysts find and answer varied security incidents quickly. Identification of continual concerns of explicit loCs helps the safety groups in enhancing the protection mechanisms and policies to shield and stop varied evolving attacks. This section provides an outline of IOCs and also the in importance, types of IOCs Key IOCs and also the pyramid of pain. Indicators of Compromise Cyber threats are endlessly evolving with the newer TTPs custom-made supported the vulnerabilities of the target organization. the safety analysts got to perform continuous observation of loCs to effectively and expeditiously find and answer the evolving cyber threats. Indicators of Compromise area unit the clues/artifact/ items of forensic knowledge that are found on a network or OS of a company that indicates a possible intrusion or malicious activity in organization&

Leverage Threat Intelligence for increased Incident Response

Image
Threat intelligence plays a very important role in incident response method. Intelligence are often integrated into the incident response method, which might facilitate IR groups with needed resources to act against security incidents quickly. It helps in distinctive who/what may well be playacting Associate in Nursing attack, however it operates, what are the campaigns it's a part of, and wherever else to go looking on the network. Given below are the phases of step-up concerned within the incident response management: Phase 1:Pre-planning IR groups use follow check and situations to check the safety arrange. Strategic· and operational-level threat intelligence are often integrated during this side of incident response in varied ways that. With the utilization of CTI, security analysts will ascertain the answers to the subsequent questions: • that hacker teams would target the organization and what are the explanations behind it? • that are the various assets they

Definition of Cyber Threat Intelligence

Image
According to Oxford dictionary, a threat is defined as the possibility of a malicious attempt to damage or disrupt a computer network or system." Threat is a potential occurrence of an undesired event t hat can eventually damage and interrupt the operational and functional activities of an organization. A threat can affect t he integrity and availability factors of an organization. The impact of threats is very high, and it can affect t he existence of the physical IT assets in an organization. The existence of threats may be accidental, intentional, or due to the impact of some other action. The threat intelligence, usually known as CTI , is defined as t he collection and analysis of information about threats and adversaries and drawing patterns t hat provide an ability to make knowledgeable decisions for the preparedness, prevent ion, and  response actions against various cyber attacks. It is t he process of recognizing or discovering any "unknown threats" t ha

Types of Vulnerability Assessment

Image
Given below are the different types of vulnerability assessments:   Active Assessment Active assessments are a type of vulnerability assessment that uses network scanners to scan the network to identify the hosts, services, and vulnerabilities present in that network. Active network scanners have the capability to reduce the intrusiveness of the checks they perform.   Passive Assessment Passive assessments sniff the traffic present on the network to identify the active systems, network services, applications, and vulnerabilities. Passive assessments also provide a list of the users who are a recently using the network. External Assessment External assessment assesses the network from a hacker's point of view to find out what exploits and vulnerabilities are accessible to the outside world. These types of assessments use external devices such as firewalls, routers, and servers. An external assessment estimates the threat of network security attacks

What is Penetration testing ?

Image
Penetration testing is a method of evaluating the security of an information system or network by simulating an attack to find out vulnerabilities that an attacker could exploit. Penetration test (or "pen-testing") exposes the gaps in the security model of an organization and helps organizations reach a balance between technical prowess and business functionality from the perspective of potential security breaches. This can help in disaster recovery and business continuity planning. It simulates methods used by intruders to gain unauthorized access to an organization's networked systems and then compromise them and involves using proprietary and open-source tools to conduct the test. Apart from automated techniques, penetration testing involves manual techniques for conducting targeted testing on specific systems to ensure that there are no security flaws that previously might have gone undetected. In the context of penetration testing, the tester is limited by resource

What is Information Warfare? & there categories

Image
The term information warfare or InfoWae refers to the use of information and communication technologies (ICT) for competitive advantages over an opponent. Examples of information warfare weapons include viruses, worms, Trojan horses, logic bombs, trap doors, nano machines and microbes, electronic jamming, and penetration exploits and tools. The use of data in warfare to realize operational objectives has forever been associate integral arm of military warfare, be it within the kinds of covert intelligence or open domestic info. However, with the rise in speed and reach of data,any interesting conflict are instantly thrust into the consciousness of the international community, and subjected to scrutiny, debates, and opinions which is able to form the portrayal of the parties concerned within the conflict. Moreover, historically weaker adversaries will leverage on low-cost and without delay out there info technology like social media platforms and video hosting websites, to wield