SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
The Need for an Effective
Security Strategy to Disrupt
Every Step in an Attack Chain
Loading up the network with a slew of point solutions is not an effective defensive
in-depth strategy. Instead, it should enable multiple tools to work together as a single
solution to identify and respond to threats anywhere in the enterprise and at any
point in the attack chain.
To thwart an attack, a successful security plan must be able to see and disrupt every move
in the attack chain in real time. In certain situations, a response does not occur immediately
after the attack is observed, emphasizing the importance of coordinated prevention across
an organization’s expanded footprint. It’s easier said than done – it necessitates
comprehending the steps of an attack and mapping them to solutions capable of responding
quickly to both known and unknown attack components and variations.
Why are so many security strategies ineffective?
The problem with most security strategies is that they can only identify and respond to a
small number of steps in an attack chain because solutions either run in isolation or have
restricted data access.
Second, all security incidents are designed to elude detection. They do this by working
under the radar to avoid triggering an alarm, or by attacking a network with several vectors
to either confuse disjointed security systems, generate distractions so the actual attack is
obfuscated, or slip past defenses undetected because each attack element on its own
appears to be benign.
Also Read: Have Enterprises Established a Holistic Cloud Security Ability?
There’s a third element as well – the inability of fragmented security solutions to efficiently
correlate threat intelligence. Understanding that the network is under attack and then
strategizing to disrupt the attack, becomes nearly impossible without the ability to connect
and utilize common threat intelligence.
Even though the steps in an attack chain can differ, the following are the general
components of an attack chain, as well as the tools used to stop them:
● Preliminary Analysis: some instances of this activity are- harvesting email
addresses, probing network edge devices for exploitable vulnerabilities, checking
websites and social media for exploitable vulnerabilities, and monitoring ports and
traffic for ways to bypass defenses. To detect and react to items like scans and
probes, security strategies should include NGFWs, web application firewalls, and
IPS systems. Prioritizing IoT and OT-aware technologies, as well as using
deception technologies, would make it more difficult for a threat actor to identify
legitimate devices and ports.
● Weaponization: This stage usually entails creating an exploit to target a known
vulnerability, such as a publicly disclosed vulnerability that must be exploited
before a patch can be deployed. It may also include using sophisticated
ransomware or other malware-based infection to exploit a zero-day vulnerability,
making detection even more difficult. To detect, evaluate, and prevent newly
developed malware designed to circumvent conventional security techniques,
security systems must include advanced threat protection technologies. It also
necessitates consistent antivirus capabilities that have been tailored to the most
recent threat intelligence from vendors and the community.
● Delivery: Compromised web pages and infected emails are still the most popular
malware distribution method. Infected attachments, connections, and websites
must be detected and blocked by secure email gateway and web security
solutions. Active training on credential theft prevention and phishing attacks for
the employees can help further reduce the attack surface.
Also Read: Improving Security Processes Through Continuous Efficacy Assessment and
Mitigation
● Exploitation, implementation, and communications: The ability to orchestrate
various technologies based on the same dataset is most important here. Breaking
the attack sequence can be done with technologies like AV, sandboxing, IPS, web
and video filtering, and DNS. In addition, advanced technologies such as EDR
and XDR tools can help the SOC team see and track lateral movement through
networks, endpoints, and clouds. Advanced AI and SOAR are critical in assisting
the teams in detecting and responding in a timely manner.
● Exfiltration: Behavioral analytics can help detect unauthorized acts, and
deception tools can be used to confuse attackers and cause them to trip alarms,
preventing them from remaining within a network for an extended period of time.
For more such updates follow us on Google News ITsecuritywire News. Please
subscribe to our Newsletter for more updates.

Weitere Àhnliche Inhalte

KĂŒrzlich hochgeladen

Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls From Pari Chowk Greater Noida ❀8448577510 âŠčBest Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❀8448577510 âŠčBest Escorts Service I...Call Girls From Pari Chowk Greater Noida ❀8448577510 âŠčBest Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❀8448577510 âŠčBest Escorts Service I...
lizamodels9
 
Russian Call Girls In Gurgaon ❀8448577510 âŠčBest Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❀8448577510 âŠčBest Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❀8448577510 âŠčBest Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❀8448577510 âŠčBest Escorts Service In 24/7 Delh...
lizamodels9
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
Call Girls In Noida 959961âŠč3876 Independent Escort Service Noida
Call Girls In Noida 959961âŠč3876 Independent Escort Service NoidaCall Girls In Noida 959961âŠč3876 Independent Escort Service Noida
Call Girls In Noida 959961âŠč3876 Independent Escort Service Noida
dlhescort
 

KĂŒrzlich hochgeladen (20)

Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls From Pari Chowk Greater Noida ❀8448577510 âŠčBest Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❀8448577510 âŠčBest Escorts Service I...Call Girls From Pari Chowk Greater Noida ❀8448577510 âŠčBest Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❀8448577510 âŠčBest Escorts Service I...
 
Whitefield CALL GIRL IN 98274*61493 ❀CALL GIRLS IN ESCORT SERVICE❀CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❀CALL GIRLS IN ESCORT SERVICE❀CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❀CALL GIRLS IN ESCORT SERVICE❀CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❀CALL GIRLS IN ESCORT SERVICE❀CALL GIRL
 
Russian Call Girls In Gurgaon ❀8448577510 âŠčBest Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❀8448577510 âŠčBest Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❀8448577510 âŠčBest Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❀8448577510 âŠčBest Escorts Service In 24/7 Delh...
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961äč‚3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961äč‚3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961äč‚3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961äč‚3876
 
Eluru Call Girls Service ☎ 93326-06886 â€ïžâ€đŸ”„ Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ 93326-06886 â€ïžâ€đŸ”„ Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ 93326-06886 â€ïžâ€đŸ”„ Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ 93326-06886 â€ïžâ€đŸ”„ Enjoy 24/7 Escort Service
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Call Girls In Noida 959961âŠč3876 Independent Escort Service Noida
Call Girls In Noida 959961âŠč3876 Independent Escort Service NoidaCall Girls In Noida 959961âŠč3876 Independent Escort Service Noida
Call Girls In Noida 959961âŠč3876 Independent Escort Service Noida
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 

Empfohlen

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
Alireza Esmikhani
 

Empfohlen (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

The need for an effective security strategy to disrupt every step in an attack chain

  • 1. The Need for an Effective Security Strategy to Disrupt Every Step in an Attack Chain Loading up the network with a slew of point solutions is not an effective defensive in-depth strategy. Instead, it should enable multiple tools to work together as a single solution to identify and respond to threats anywhere in the enterprise and at any point in the attack chain. To thwart an attack, a successful security plan must be able to see and disrupt every move in the attack chain in real time. In certain situations, a response does not occur immediately after the attack is observed, emphasizing the importance of coordinated prevention across an organization’s expanded footprint. It’s easier said than done – it necessitates
  • 2. comprehending the steps of an attack and mapping them to solutions capable of responding quickly to both known and unknown attack components and variations. Why are so many security strategies ineffective? The problem with most security strategies is that they can only identify and respond to a small number of steps in an attack chain because solutions either run in isolation or have restricted data access. Second, all security incidents are designed to elude detection. They do this by working under the radar to avoid triggering an alarm, or by attacking a network with several vectors to either confuse disjointed security systems, generate distractions so the actual attack is obfuscated, or slip past defenses undetected because each attack element on its own appears to be benign. Also Read: Have Enterprises Established a Holistic Cloud Security Ability? There’s a third element as well – the inability of fragmented security solutions to efficiently correlate threat intelligence. Understanding that the network is under attack and then strategizing to disrupt the attack, becomes nearly impossible without the ability to connect and utilize common threat intelligence. Even though the steps in an attack chain can differ, the following are the general components of an attack chain, as well as the tools used to stop them: ● Preliminary Analysis: some instances of this activity are- harvesting email addresses, probing network edge devices for exploitable vulnerabilities, checking websites and social media for exploitable vulnerabilities, and monitoring ports and
  • 3. traffic for ways to bypass defenses. To detect and react to items like scans and probes, security strategies should include NGFWs, web application firewalls, and IPS systems. Prioritizing IoT and OT-aware technologies, as well as using deception technologies, would make it more difficult for a threat actor to identify legitimate devices and ports. ● Weaponization: This stage usually entails creating an exploit to target a known vulnerability, such as a publicly disclosed vulnerability that must be exploited before a patch can be deployed. It may also include using sophisticated ransomware or other malware-based infection to exploit a zero-day vulnerability, making detection even more difficult. To detect, evaluate, and prevent newly developed malware designed to circumvent conventional security techniques, security systems must include advanced threat protection technologies. It also necessitates consistent antivirus capabilities that have been tailored to the most recent threat intelligence from vendors and the community. ● Delivery: Compromised web pages and infected emails are still the most popular malware distribution method. Infected attachments, connections, and websites must be detected and blocked by secure email gateway and web security solutions. Active training on credential theft prevention and phishing attacks for the employees can help further reduce the attack surface. Also Read: Improving Security Processes Through Continuous Efficacy Assessment and Mitigation ● Exploitation, implementation, and communications: The ability to orchestrate various technologies based on the same dataset is most important here. Breaking the attack sequence can be done with technologies like AV, sandboxing, IPS, web and video filtering, and DNS. In addition, advanced technologies such as EDR and XDR tools can help the SOC team see and track lateral movement through
  • 4. networks, endpoints, and clouds. Advanced AI and SOAR are critical in assisting the teams in detecting and responding in a timely manner. ● Exfiltration: Behavioral analytics can help detect unauthorized acts, and deception tools can be used to confuse attackers and cause them to trip alarms, preventing them from remaining within a network for an extended period of time. For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for more updates.