Télécommunications

Cybersecurity Awareness Month – Day 28/31 – Defense in Depth – Detection

Cybersecurity Awareness Month Tip 28/31: Defense In Depth – Compromise Detection

Eventually, most businesses will be compromised. It is a statistical fact. And according to IBM, the average time it takes to detect a compromise is over 250 days. That is more than 8 months of a bad guy being on your network without you knowing.

When we talk about defense in depth, it is important to acknowledge that defenses are not absolutes. Even if a defense « fails » it may still help slow attackers down, leave forensic evidence for investigators to follow, or set off an alarm so you know you are under attack.

And that is what today’s tip is about, ensuring you have visibility into the bad stuff. A common part of host base defenses are around simply knowing if bad stuff is happening, even if you can’t automatically stop it.

The D in EDR, XDR, and MDR standards for Detection becasue these tools help you understand if a host is compromised.

A NIDS is a Network Intrusion Detection System that watches traffic on things like routers or switches to determine if the activity is suspicious.

In an ideal world, all of this data is fed into a SIEM (Security Information and Event Monitoring) tool, and monitored by a SOC or IT team who understands what to do with the information.

Using frameworks like the MITRE ATT&CK Defender SOC Evaluation to help you better understand your collection capability and your blind spots is a great way to help ensure that your detection capability is keeping up with your defenses.

#cybersecurity #blueteam #infosec #killchain

https://www.linkedin.com/posts/jordansilva_cybersecurity-blueteam-infosec-activity-6993101803533848576-UaQk?

Views : 2
cyber security

Source by MSP Culture

Mourad ELGORMA

Fondateur de summarynetworks, passionné des nouvelles technologies et des métiers de Réseautique , Master en réseaux et système de télécommunications. ,j’ai affaire à Pascal, Delphi, Java, MATLAB, php …Connaissance du protocole TCP / IP, des applications Ethernet, des WLAN …Planification, installation et dépannage de problèmes de réseau informatique……Installez, configurez et dépannez les périphériques Cisco IOS. Surveillez les performances du réseau et isolez les défaillances du réseau. VLANs, protocoles de routage (RIPv2, EIGRP, OSPF.)…..Manipuler des systèmes embarqués (matériel et logiciel ex: Beaglebone Black)…Linux (Ubuntu, kali, serveur Mandriva Fedora, …). Microsoft (Windows, Windows Server 2003). ……Paquet tracer, GNS3, VMware Workstation, Virtual Box, Filezilla (client / serveur), EasyPhp, serveur Wamp,Le système de gestion WORDPRESS………Installation des caméras de surveillance ( technologie hikvision DVR………..). ,

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *