Decimating the hacker's moves

Decimating the hacker's moves

We are living in an age of cyber threats. Cyber intelligence professionals are rising in demand every day. Protecting the enterprise and its assets has gained prominence in the digital era. According to the council on cyber security, ‘offense meets defense’ is one of the critical tenets in an effective cyber defense system.

Analyzing the offense/ cyber attacks made on a system will help us understand the loopholes. This is a reactive approach.

What is wrong with the current enterprise security approach?

Enterprise security is a pro-active measure. The current approach is flawed because it deals with response.

Examples include:

  1. Incident response
  2. Threat response
  3. Attack response

The above examples are purely reactive in nature.

To be on par, if not ahead of the hackers/ attackers, one needs to develop those traits that are required of a hacker. Let’s try rephrasing the above three examples from a hacker’s perspective.

  1. Incident minimization
  2. Threat termination
  3. Attack block

The security architecture design will impact the overall performance of system protection. 

要查看或添加评论,请登录

Prasanna Venkatesh CB ??的更多文章

社区洞察

其他会员也浏览了