- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 237字
- 2021-06-30 19:15:47
Assume breach
Due to the emerging threats and cyber security challenges, it was necessary to change the methodology from prevent breach to assume breach. The traditional prevent breach approach by itself does not promote the ongoing testing, and to deal with modern threats you must always be refining your protection. For this reason, the adoption of this model to the cybersecurity field was a natural move.
When the former director of the CIA and National Security Agency Retired Gen. Michael Hayden said in 2012(26):
During an interview, many people didn't quite understand what he really meant, but this sentence is the core of the assume breach approach. Assume breach validates the protection, detection, and response to ensure they are implemented correctly. But to operationalize this, it becomes vital that you leverage Red/Blue Team exercises to simulate attacks against its own infrastructure and test the company's security controls, sensors, and incident-response process.
In the following diagram, you have an example of the interaction between phases in the Red Team/Blue Team exercise:

It will be during the post breach phase that the Red and Blue Team will work together to produce the final report. It is important to emphasize that this should not be a one off exercise, instead, must be a continuous process that will be refined and improved with best practices over time.
- 電腦組裝與系統安裝
- 零起點學Linux系統管理
- Social Media Mining with R
- Linux系統文件安全實戰全攻略
- 開源安全運維平臺OSSIM疑難解析:入門篇
- 循序漸進學Docker
- Mobile First Design with HTML5 and CSS3
- 一學就會:Windows Vista應用完全自學手冊
- Windows 7實戰從入門到精通(超值版)
- Learn Quantum Computing with Python and IBM Quantum Experience
- 鴻蒙入門:HarmonyOS應用開發
- Microsoft Hyper-V Cluster Design
- Learn OpenShift
- Hadoop Operations and Cluster Management Cookbook
- Docker for Developers