Cyber defense



Download 2.54 Mb.
View original pdf
Page21/85
Date09.12.2022
Size2.54 Mb.
#60094
1   ...   17   18   19   20   21   22   23   24   ...   85
Cyber Defense Handbook
CIBERDEFENSA
ORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
32 150.
Silent cyber effects are the impacts that go unnoticed by the victim, such as information exfiltration, non-conspicuous modification of information and web content, impersonation, credential theft, network monitoring, etc.
151.
Silent effect cyber attacks seek persistence, that is, to have control as long as possible. Consequently, originators take great care not to leave a trace and they combine periods of activity with periods of inactivity, which are sometimes very long. In addition, they camouflage their activity under the usual parameters of the victim’s activity so as not to attract attention.
152.
Usually, silent effect cyber attacks cause significant longstanding operational, economic or reputational losses, although the organization, in many cases, may not be aware of this.
153.
In most cases, silent effect cyber attacks are not detectable by traditional cyber defense means (threat detection, therefore advanced cyber defense (threat hunting) is required.
154.
The cyber kill chain of silent effect cyber attacks are usually long lasting. The reconnaissance and weaponization phases usually take long because silent cyberattacks are very sophisticated and require careful preparation. The delivery, exploitation, installation and command and control phases are usually long because early detection must be avoided by all means. The actions on objectives phase, in particular, is usually very long that is, the period from the first attack until the victim detects the cyber attack usually takes years and, in many cases, the period from detection until the victim manages to totally eradicate the attacker’s action can also take years.
155.
Silent effect cyber attacks are extremely dangerous because, for years, the victim does not perceive the loss of operation and competitiveness.
FIGURE 16.
CYBER EFFECTS


GUÍA DE

Download 2.54 Mb.

Share with your friends:
1   ...   17   18   19   20   21   22   23   24   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page