Decimating the hacker's moves
We are living in an age of cyber threats. Cyber intelligence professionals are rising in demand every day. Protecting the enterprise and its assets has gained prominence in the digital era. According to the council on cyber security, ‘offense meets defense’ is one of the critical tenets in an effective cyber defense system.
Analyzing the offense/ cyber attacks made on a system will help us understand the loopholes. This is a reactive approach.
What is wrong with the current enterprise security approach?
Enterprise security is a pro-active measure. The current approach is flawed because it deals with response.
Examples include:
- Incident response
- Threat response
- Attack response
The above examples are purely reactive in nature.
To be on par, if not ahead of the hackers/ attackers, one needs to develop those traits that are required of a hacker. Let’s try rephrasing the above three examples from a hacker’s perspective.
- Incident minimization
- Threat termination
- Attack block
The security architecture design will impact the overall performance of system protection.
Principal Architect
9 年Interesting.