Cyber defense



Download 2.54 Mb.
View original pdf
Page59/85
Date09.12.2022
Size2.54 Mb.
#60094
1   ...   55   56   57   58   59   60   61   62   ...   85
Cyber Defense Handbook
Cyber threat hunting
478.
Cyber threat hunting is a dynamic and proactive cyber defense process aimed at the detection and isolation of advanced threats that evade traditional security solutions based on SIEM and cybersecurity perimeter devices (firewalls, IDS, IPS, sandboxing48, etc.).
479.
Traditional cyber defense (cyber threat detection) is based on its own network monitoring, mainly at the perimeter, in order to detect cyber attacks by recognizing previously known patterns, anomalies and threats (signature).


480.
Cyber threat hunting is based on its own network monitoring, at the perimeter and internally, in order to discover new patterns of cyber attack by automatically identifying unusual behaviors (behaviors that do not adjust to the usual activity of the network) of users, processes, and devices.
481.
An effective threat hunting system is a creative process (based on hypotheses and assumptions of noncompliance) materialized through a flexible methodology that bases the success on the knowledge, experience and skills of the personnel who operate it (hunters or analysts) rather than in the tools.
482.
Once anew pattern is discovered, a reaction (automatic or human) must be triggered to repel the cyber attack and then anew plan must be designed and implemented, in collaboration with traditional security, to reduce the attack surface. Finally, the forensic investigation service can initiate investigations to discover the causes and origin.
483.
In any case, a strong cyber defense needs both types of cyber defense approaches (threat detection and threat hunting) since they complement each other.
484.
The current international reference for the preparation of cyber threat models and methodologies is the open access MITRE ATT&CK®
49
knowledge base that provides information on TTPs (tactics, techniques and procedures) based on real-world observations.
485.
The MITRE ATT&CK® reference provides a technical and operational framework for cybersecurity commonly used in both public and private sectors, facilitating public-private understanding and cooperation.
GUÍA DE

Download 2.54 Mb.

Share with your friends:
1   ...   55   56   57   58   59   60   61   62   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page