Digital Transformation Security Factors

 Disrupt, Detect, Delay, Defeat

  • Consider the four Ds of an effective cyberdefense
  • Disrupt attacks to make them more difficult and deter less-determined attackers. 
  • Detect attacks so defenders can learn about them and prepare a response. 
  • Delay attacks in progress via obstacles requiring attackers spend time working around them. 
  • Defeat attacks as quickly as possible and before they can accomplish their objectives. 
ENTERPRISE ATTACK SEQUENCE IN DETAIL 

  • Targeted attacks methodically work through victim defenses
  • The attack sequence gives defenders opportunities to successfully defend the enterprise by tracing the attack backward and identifying the data attackers might want to steal, modify, or destroy
  • Attackers might target data on servers, on endpoints, over the network, in backups, or on its customers’ or business partners’ systems
  • Attack steps are not always executed exactly in sequence
  • This process does not deal with distributed denial of service attacks. 

WHY SECURITY FAILS AGAINST ADVANCED ATTACKS

  • For every defensive capability, there is a corresponding attacker tool, technique, or procedure. 
  • There is no perfect or unbreakable defense.
  • Real-world attacks often use relatively simple attack methods.
  • Viruses 
  • Spear phishing –Published vulnerabilities 
  • Credential theft 
  • Web site compromise
  • Even with data encryption, high-assurance hardware, and physical isolation, enterprises remain open to more basic formats of attack.
 





#DigitalTransformation
#Digitalization
#Digitization
#Transformation
#Training
#التحول الرقمي
#الرقمنة
#التدريب
#EnterpriseArchitecture
#Security
#InformationSecurity
#Innovation
#ArtificialIntelligence


Comments

Popular posts from this blog

Benefits of SMS Marketing for Small Business

SETUP AND CREATE YOUR BUSINESS MARKETING BLOG

De Kare-Silver’s electronic shopping test