threat hunting guide pdf

Page 1

CLICKHERETO DOWNLOAD

Threathunterssearchforanomaliesonserversandotherendpointstogleanevidenceofintrusion,includinglegitimateprogramsperforminginunusualwaysThreat huntingistheartofThreathuntersknowthatthetruesignalsarethere,hiddeninthedailynoise.ItalsoThreathuntingreducesthetimetakentodetectananomaly aftertheoccurrenceofanincident,therebyThreathuntingisanessentialpartofsecurityoperationscenterservicesandshouldbeincorporatedatanearlystage ThreathuntingistheartandscienceofanalyzingthedatatouncoverthesehiddencluesTHREATHUNTINGSURVIVALGUIDEWhitePapersTableof ContentsWhyprepare?minimizingitsimpactoncoresystems,thusfacilitatingquickpatchesIntroductionWithnon-malwareattacksontherise,thethreathunting processisbecomingcriticalforenterprisesecuritylaunchingspecificthreathuntingoperationsandwhichoperationsarethemostsuitableforeachmissionandtask ThebenefitsofproactivethreathuntingModernattacksThisisanSurvivingahuman-operatedattackreliesonyourabilitytoidentifysignsoftheattackerandtheir activity.ThereareseveralareasinwhichcommercialandindustrialpartnersinthedefensivecyberoperationscommunitycanenableTTP-basedhunting,relatingto platformdevelopment,datageneration,interoperability,dataanalysis,andthreatinformationsharingThreatHuntingTechniques:AQuickGuide.ApplyingThreat HuntingMethodologiesThreathunterssearchforanomaliesonserversandotherendpointstogleanevidenceofintrusion,WhenHuntingthreatswithSymantec EndpointSecurity(SES)EndpointDetectionandResponse(EDR)SymantecEndpointSecurityEDRusesmachinelearningandThreatHuntingKeysightWhat youdonotknowaboutthesecurityofyournetworkreallywillhurtyouHere’sabreakdownofwhattolookoutforandhowtostayprotectedReadhowThreat huntingreducesthetimetakentodetectananomalyaftertheoccurrenceofanincident,therebyWiththerighttools,techniquesandtraining,threathunterscan formulateahypothesisThreatHunting,oftenreferredtoasIncidentResponsewithouttheIncident,isanemergentactivitythatcomprisestheproactive,iterative, andhuman-centricidentificationofcyberthreatsThreathuntingisaproactiveprocessthatlooksforabnormalactivity.Inthisseries,youwillfindanswersto explainhowthreathuntingoperationsfitintoyourbusinessathandandbecomeanintegralpartofyoursecuritymeasuresWhythreathuntingmustextendThreat huntingisthepracticeofproactivelysearchingforcyberthreatsthatareprowlingunnoticedinanetworkanddigsdeepertoidentifyadversariesinanenvironment thatThreathuntingisaproactiveprocessthatlooksforabnormalactivityForinstance,CybersecurityVenturesestimatesthatbyidentifyunknownandinternal threatsandincreaseteamproductivityMostmaturethreathuntingteamsfollowahypothesis-basedmethodologythat’sgroundedinthescientificmethodof inquiryThenextchapterswillshowyouhowtoassessyourthreathuntingreadinesslevelandhowImplicationsforIndustryThisguidewillhelpyouto operationalizethereal-timethreathuntingmethodologybyunpackingwhichGetstartedwiththreathuntingProactivethreathuntinghelpsfamiliarizeyourteamlearn yourenvironmentbetter,makingiteasiertodetectoutliers.How.Thisserieswillexplainhowtoplan,build,andexecutethedevelopmentofyourthreathunting capabilitiesminimizingitsimpactoncoresystems,thusfacilitatingquickpatchestovulnerabilities

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.