Digital Transformation Security Factors
Disrupt, Detect, Delay, Defeat
- Consider the four Ds of an effective cyberdefense
- Disrupt attacks to make them more difficult and deter less-determined attackers.
- Detect attacks so defenders can learn about them and prepare a response.
- Delay attacks in progress via obstacles requiring attackers spend time working around them.
- Defeat attacks as quickly as possible and before they can accomplish their objectives.
ENTERPRISE ATTACK SEQUENCE IN DETAIL
- Targeted attacks methodically work through victim defenses
- The attack sequence gives defenders opportunities to successfully defend the enterprise by tracing the attack backward and identifying the data attackers might want to steal, modify, or destroy
- Attackers might target data on servers, on endpoints, over the network, in backups, or on its customers’ or business partners’ systems
- Attack steps are not always executed exactly in sequence
- This process does not deal with distributed denial of service attacks.
WHY SECURITY FAILS AGAINST ADVANCED ATTACKS
- For every defensive capability, there is a corresponding attacker tool, technique, or procedure.
- There is no perfect or unbreakable defense.
- Real-world attacks often use relatively simple attack methods.
- Viruses
- Spear phishing –Published vulnerabilities
- Credential theft
- Web site compromise
- Even with data encryption, high-assurance hardware, and physical isolation, enterprises remain open to more basic formats of attack.
#DigitalTransformation
#Digitalization
#Digitization
#Transformation
#Training
#التحول الرقمي
#الرقمنة
#التدريب
#EnterpriseArchitecture
#Security
#InformationSecurity
#Innovation
#ArtificialIntelligence
Comments
Post a Comment