How to implement zero trust architecture | complete guide 2024

How to implement zero trust architecture | complete guide 2024

No one is trusted by default (straight forward definition of zero trust architecture). The concept was founded by an analyst John Kindervag of Forrester Research. An advance and effective network architecture was needed because the “Traditional model of network security was no longer sufficient to fight against rapidly increasing attack vectors.“ The traditional model of…

how to do OSINT(open source intelligence) | Guide for beginners

how to do OSINT(open source intelligence) | Guide for beginners

OSINT (Open Source Intelligence) is equally beneficial for both the attackers (malicious actors) and defenders. According to SANS institute, it is defined as: “Intelligence produced by collecting, evaluating and analyzing publicly available information with the purpose of answering a specific intelligence question.” Malicious actors use OSINT in order to collect information for Reconnaissance stage of…

Reconnaissance: Understanding the important stage in cyber kill chain

Reconnaissance: Understanding the important stage in cyber kill chain

In order to properly plan and carry out an assault, attackers need to obtain vital information about their target, which is why the reconnaissance step of the cyber Kill Chain is so important. For instance, in the Target data breach of 2013, attackers employed reconnaissance to find employee credentials and network vulnerabilities. This information allowed…

How unified kill chain works | complete guide for beginners

How unified kill chain works | complete guide for beginners

you can consider the unified kill chain as an updated and most reliable version of cyber kill chain (traditional threat model for defending against cyber attacks). This model covers most of the attack vectors and effective against advance persistence threats (APTs) and ransomwares. “kill chain” is a military term used to describe series of steps…

How cyber kill chain framework works? complete guide for beginners

How cyber kill chain framework works? complete guide for beginners

The Cyber Kill Chain model, designed by Lockheed Martin, is a strategy for understanding and responding to cyber warfare. The following are its seven phases: Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, and Actions on Objectives. Dividing these phases helps security professionals to be able to realize, anticipate, and disrupt malicious activity within these…