4-1 Discussion_ Thinking Like a Hacker Response 1

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

-510

Subject

Information Systems

Date

Oct 30, 2023

Type

docx

Pages

2

Uploaded by ElderLightning8081

Report
In your responses to at least two classmates, compare and contrast your peer's considerations with your own. Identify at least one resource or key idea that provided utility in developing considerations that you feel would help your peer defend against a hacker. Hello Matt, You and I had similar thoughts and ideas about helping to defend against a hacker. We both wrote about being one step ahead to outsmart a hacker by learning their behavior, reading about cyberattacks, and continuing to think like a hacker. The one difference that we had was that you laid out the Cyber-Attack Chain MITRE ATT&CK framew ork. This framework focuses on initial reconnaissance and weaponization of a threat. This is done through the delivery, exploitation, installation, command and control, and lastly to the activities committed by an attacker. This includes data exfiltration or other harmful actions that may be occurring (IstroSec, 2023). I agree that this is imperative to defending against a hacker and felt that this was a key item I was missing. Remembering to utilize the cyber-attack chain and MITRE ATT&CK framework will no doubt prepare me for the future when faced with an incident. Thank you for sharing your thoughts and providing another perspective! Best, Ryan White Reference IstroSec, T. &. (2023, March 26). MITRE ATT&CK and cyber kill chain . IstroSec.
https://istrosec.com/blog/mitre-attack-and-cyber-kill-chain/#:~:text=The%20Cyber %20Kill%20Chain%20is,exfiltration%20or%20other%20harmful%20actions
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help

Browse Popular Homework Q&A

Q: (a) L = {abc² (b) L = {a¹bmck : n = m or m≤k}. : n = m or m‡k}.
Q: 1. VOCABULARY Sketch an example of adjacent angles that are complementary. Are all complementary…
Q: The Blue Diamond Company advertises that their nut mix contains (by weight) 40% cashews, 15% Brazil…
Q: (b) ad
Q: 8 Directions - Label the diagram with the following values, then solve for x. FG = 10+x GH = 7 FH =…
Q: & ameloblasts, that help create teeth. mammals develop during embryonic que
Q: What are 3 isotopes of H and how are they different?
Q: A balloon is filled to a volume of 1.75 L with 3.00 moles of gas at 25 °C. With pressure and…
Q: hi please provide the correct answer. thanks Which of the following is not an example of a…
Q: Centr 3. What is the molar concentration of a 3.50 L. solution that contains 35.0 grams of NaOH…
Q: The specific heat of water is 1.00 cal/g °C, the heat of vaporization of water is 540 cal/g, and the…
Q: What is the role of the Securities and Exchange Commission (SEC)? How does it influence the economy?
Q: What are the various block placement schemes in cache memory?
Q: As a group, the Dutch are among the tallest people in the world. The average Dutch man is 184 cm…
Q: Chesapeake bay different from the Florida intercostal waterway?
Q: g(x) = z² + 2z+1 f(x) = 4x-3 Find f(3) + g(3)
Q: Genetics of man question:Describe the molecular genetics analysis for the GATA binding protein gene…
Q: We started with 50 snack bags. The kids that left early all took three bags. How many bags are left?
Q: A sample of gas at 2455 torr is cooled from 150.0 °C to 100.0 °C. Assuming the volume is constant,…
Q: Find f + g, f - g, f . g, and f/g for the given pair of functions. State the domain of each of the…
Q: Write a brief paragraph on subject selection, including how well the subjects represented their…
Q: 1. Base your answer to the following question on the diagram below and on your knowledge of biology.…