没有合适的资源?快使用搜索试试~ 我知道了~
首页The Open Source Cybersecurity Playbook
The Open Source Cybersecurity Playbook
需积分: 9 163 浏览量
更新于2023-05-26
评论
收藏 646KB PDF 举报
The Open Source Cybersecurity Playbook, 作者PETE HERZOG。 这是一本为IT从业者写的一本如何理解和构建网络安全的指南书。
资源详情
资源评论
资源推荐

TM
THE OPEN SOURCE
CYBERSECURITY
PLAYBOOK
CONTRIBUTORS
WRITTEN BY PETE HERZOG

Contents
Part 1: Scouting Reports
Proles for ten of the most common threats you should be prepared to face.
Part 2: The Game Plan
A practical, step-by-step process for making your organization more secure.
Part 3: Looking Downeld
Set yourself up for success both now and in the long run as threats evolve.
TM
03
10
19
THE OPEN SOURCE CYBERSECURITY PLAYBOOK
CREATIVE COMMONS ATTRIBUTION-NODERIVATIVES 4.0 2016 ISECOM AND BARKLY

THE OPEN SOURCE CYBERSECURITY PLAYBOOK
TM
Part 1: Scouting Reports
What security threats should I be prepared for?
The rst key to any effective security game plan is knowing what you’re up
against. In this section, you’ll learn all about ten of the most common threats
your company is likely to face.
While by no means comprehensive, this list can help you better understand
some of the tactics being directed against you and your users, along with the
specic reasons you’re potentially vulnerable to each.
From phishing to ransomware to distributed denial of service (DDoS) attacks,
the more you know about these threats the better. They’re some of the leading
causes of data breaches, downtime, and a serious lack of sleep.

4
THE OPEN SOURCE CYBERSECURITY PLAYBOOK
TM
Phishing
What it is:
Any attempt to compromise a system and/or steal information by tricking a user into
responding to a malicious message. The most common phishing attacks involve emails
armed with malware hidden in attachments or links to infected websites, although
phishing can be conducted via other methods such as voicemail, text messages, and
social media, too.
What makes protection a challenge:
For one thing, employees are already in the habit of clicking things because that’s how you
interact with modern computers. For another, phishing emails are much more sophisticated
than they used to be. Scammers can take over legitimate email accounts or spoof their
email addresses to make it look like messages are coming from someone employees trust.
Once a victim is tricked and becomes compromised, the attacker now has their access
credentials. They can reach all the same servers, log into the same web applications, and
download the same les as if they were that employee. The challenge with protecting
against this is you need to limit what servers employees can access or how they can
access them. There are times that may run counter to what they need to do their jobs.
Additionally, even if you train employees to be on the lookout for suspicious emails, some
phishing attacks can be extremely targeted and look just like any other email from a
trusted source who is being impersonated. The most convincing examples of these
“spear phishing attacks” don’t provide any red flags until it’s too late.
Social Engineering
What it is:
There are two ways to steal anything — you either take it yourself or you get someone else
to give it to you. Social engineering is a broad umbrella term for any tactics designed to
exploit and manipulate trust, so the victim hands the attacker what they want — access to
information, accounts, or computers inside a secured area. Think fake customer service
calls designed to reset passwords or a criminal spoong your CEO’s email address and
asking someone in nance to send an urgent wire transfer — a type of scam referred to
as a business email compromise (BEC).
What makes protection a challenge:
Everyone — repeat, everyone — can be conned, defrauded, fooled, or manipulated. Being
vulnerable can sometimes come down to a lack of training or experience, but more often
it can simply come down to distraction and mental fatigue.
Since this attack targets people directly there’s very little that technical safeguards can
do, especially if the action isn’t outside the employee’s typical responsibilities or usual
behavior — like resetting a password for a desperate user (a typical tech support con).
PART 1: SCOUTING REPORTS

5
THE OPEN SOURCE CYBERSECURITY PLAYBOOK
TM
Ransomware
What it is:
Malicious software designed to encrypt a victim’s les and then demand payment, generally
in anonymous Bitcoin, in exchange for decrypting the les.
As with other malware infections, ransomware attacks typically start with employees
falling victim to phishing emails or visiting compromised websites. Unlike other malware
infections, however, the primary goal of ransomware isn’t to gain stealth and persistence for
long periods of time. Instead, its priority is to spread as quickly as possible, encrypt as much
data as possible, then actively alert victims of its presence so criminals can extort them.
What makes protection a challenge:
Ransomware will lock up any drive the employee has access to, including connected USB
drives and network shares. Once les are encrypted the only way to regain access to them
is to a) hope you have a reliable, up-to-date backup; b) hope a security researcher has
cracked the encryption and made a decrypting tool available; or c) hold your nose and pay
the ransom. Paying up is anything but a sure thing, because, well, ransomware authors are
criminals. Being dishonest is what they do. They’re also occasionally less than spectacular at
coding, so there’s also the risk of paying the ransom only to nd your les were
accidentally destroyed or rendered unrecoverable.
One reason ransomware is hard to protect against is because it’s built to turn a strength
— making les accessible across an organization — into a weakness. Additionally, with
ransomware developing into a billion-dollar industry, there’s plenty of incentive for criminals
to continue investing in delivery and evasion tactics to keep their business model humming.
That means they can change faster than your signature-based security solutions can
keep up.
Downloaders
What it is:
Normal-looking programs designed to fetch and install malware without raising any security
alarms. In effect, what downloaders allow attackers to do is to get a “man on the inside” prior
to committing to a full attack (it’s no coincidence they’re typically called “trojan programs”).
Once a downloader creeps its way onto a victim’s system it can scope out the security
settings, then smuggle other dangerous malware in after it’s established the cost is clear.
Even after an attack is discovered and the other malware has been removed, as long
as the downloader is still there hiding away, it can grab more malware and start the
process all over again.
PART 1: SCOUTING REPORTS
剩余26页未读,继续阅读
















Paul.Li
- 粉丝: 10
- 资源: 13
上传资源 快速赚钱
我的内容管理 收起
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助

会员权益专享
最新资源
- Xilinx SRIO详解.pptx
- Informatica PowerCenter 10.2 for Centos7.6安装配置说明.pdf
- 现代无线系统射频电路实用设计卷II 英文版.pdf
- 电子产品可靠性设计 自己讲课用的PPT,包括设计方案的可靠性选择,元器件的选择与使用,降额设计,热设计,余度设计,参数优化设计 和 失效分析等
- MPC5744P-DEV-KIT-REVE-QSG.pdf
- 通信原理课程设计报告(ASK FSK PSK Matlab仿真--数字调制技术的仿真实现及性能研究)
- ORIGIN7.0使用说明
- 在VMware Player 3.1.3下安装Redhat Linux详尽步骤
- python学生信息管理系统实现代码
- 西门子MES手册 13 OpcenterEXCR_PortalStudio1_81RB1.pdf
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈



安全验证
文档复制为VIP权益,开通VIP直接复制

评论0