- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 205字
- 2021-06-30 19:15:46
The shift in the threat landscape
In 2016, a new wave of attacks also gained mainstream visibility, when CrowdStrike reported that it had identified two separate Russian intelligence-affiliated adversaries present in the United States Democratic National Committee (DNC) network (19). According to their report, they found evidence that two Russian hacking groups were in the DNC network: Cozy Bear (also classified as APT29) and Fancy Bear (APT28). Cozy Bear was not a new actor in this type of attack, since evidence has shown that in 2015 (20) they were behind the attack against the Pentagon email system via spear phishing attacks.
This type of scenario is called Government-sponsored cyber attacks, but some specialists prefer to be more general and call it data as a weapon, since the intent is to steal information that can be used against the hacked party. The private sector should not ignore these signs.
Nowadays, continuous security monitoring must leverage at least the three methods shown in the following diagram:

This is just one of the reasons that it is becoming primordial that organizations start to invest more in threat intelligence, machine learning, and analytics to protect their assets. We will cover this in more detail in Chapter 12, Threat Intelligence.
- Kubernetes修煉手冊
- Mastering vRealize Operations Manager(Second Edition)
- 每天5分鐘玩轉Kubernetes
- Cybersecurity:Attack and Defense Strategies
- 從零開始寫Linux內核:一書學透核心原理與實現
- Hands-On DevOps with Vagrant
- 構建可擴展分布式系統:方法與實踐
- Windows 7案例教程
- 注冊表應用完全DIY
- Red Hat Enterprise Linux 6.4網絡操作系統詳解
- 寫給架構師的Linux實踐:設計并實現基于Linux的IT解決方案
- Learning Continuous Integration with Jenkins(Second Edition)
- bash shell腳本編程經典實例(第2版)
- 電腦辦公(Windows 10 + Office 2016)入門與提高(超值版)
- Learning Joomla! 3 Extension Development(Third Edition)