- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 205字
- 2021-06-30 19:15:46
The shift in the threat landscape
In 2016, a new wave of attacks also gained mainstream visibility, when CrowdStrike reported that it had identified two separate Russian intelligence-affiliated adversaries present in the United States Democratic National Committee (DNC) network (19). According to their report, they found evidence that two Russian hacking groups were in the DNC network: Cozy Bear (also classified as APT29) and Fancy Bear (APT28). Cozy Bear was not a new actor in this type of attack, since evidence has shown that in 2015 (20) they were behind the attack against the Pentagon email system via spear phishing attacks.
This type of scenario is called Government-sponsored cyber attacks, but some specialists prefer to be more general and call it data as a weapon, since the intent is to steal information that can be used against the hacked party. The private sector should not ignore these signs.
Nowadays, continuous security monitoring must leverage at least the three methods shown in the following diagram:

This is just one of the reasons that it is becoming primordial that organizations start to invest more in threat intelligence, machine learning, and analytics to protect their assets. We will cover this in more detail in Chapter 12, Threat Intelligence.
- Linux網絡管理與配置(第2版)
- Windows Vista基礎與應用精品教程
- 鴻蒙生態:開啟萬物互聯的智慧新時代
- Ansible權威指南
- 蘋果電腦玩全攻略 OS X 10.8 Mountain Lion
- 循序漸進學Docker
- Mastering Reactive JavaScript
- 注冊表應用完全DIY
- OpenStack系統架構設計實戰
- OpenSolaris設備驅動原理與開發
- 從實踐中學習Windows滲透測試
- Ubuntu Linux操作系統實用教程
- Hadoop Real-World Solutions Cookbook
- OpenHarmony開發與實踐:基于紅莓RK2206開發板
- 每天5分鐘玩轉Docker容器技術