Sample Solution

This week in class, we discussed the steps of the Cyber Kill Chain (CKC) and attack surfaces. We also explored defense-in-depth approach for defending against cyber attacks. The CKC is a stepwise framework which includes Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control, and Actions on Objectives. It is important to understand each step in order to proactively defend against cyberattacks. Attack surfaces are any entry points into an organization’s network from which attackers can gain access or initiate malicious activity. We further discussed how companies like Equifax have been victims of sophisticated hacks due to not having necessary security measures in place or not paying attention to potential vulnerabilities in their systems.

One of the most enlightening aspects of this week’s session was understanding how hackers utilize different techniques such as reconnaissance and weaponization to execute successful attacks on organizations with vast amounts of data stored online. I was surprised at just how complicated the process is for hackers who plan these types of attacks but it makes sense that they need detailed preparation before launching their operations. Furthermore, I learned about defense-in-depth strategies including password policy enforcement and utilizing network segmentation which can be used by organizations to protect sensitive assets from attackers.

I am still wondering what specific challenges organizations face when creating layers of defense within their networks? How should organizations prioritize certain security measures over others based on potential risk levels?

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 WhatsApp Us Now