Thursday, April 23, 2020

Why You Need a Cybersecurity Knowledge Base

Threat intelligence feeds work best when they act as a starting point. First, an ISAO, ISAC or threat feed captures real-life examples of exploits that are specific to an organization’s systems. But, that's just the beginning.

Cybersecurity professionals are expected to customize and contextualize that information. They supplement given information with more specific knowledge about indicators of attack (IoA) and indicators of compromise (IoC) that are happening to their organization. Then they can investigate each tactic, technique and procedure (TTP) of a specific attack waged on the organization.

Here’s a quick overview of the difference between a tactic, technique and a procedure:
Tactic: A goal (e.g., the hacker wishes to extort money from a hospital through ransomware)
Technique: A particular activity (e.g., sending phishing e-mails to the people most likely to click on the link or attacking systems that are known to have a buffer overflow, like a low patch level, or some other vulnerability)
Procedure: The actual methods – as specific and procedural as possible – used to obtain information about vulnerable end users or systems (e.g., the details about the steps the attacker took to conduct a ransomware attack on your particular network)

Imagine how useful it would be if you could create a searchable knowledge base that captures your latest insights about how to pivot resources in your company.
What Types of Questions Will I Have to Answer?

CompTIA IT Fundamentals makes it easy for you by using multiple-choice questions to assess your current skills and help you figure out if IT is right for you.

CompTIA A+ takes things a step further with performance-based questions, which test your hands-on skills to prove to employers that you have the skills needed for tech support jobs. Learn more about IT careers with our newly revised career roadmap.

No comments:

Post a Comment