Summary of Hacker’s Playbook (1).docx - Summary of Hacker’s...

This preview shows page 1 - 2 out of 3 pages.

Summary of Hacker’s PlaybookMonil PandyaAbstract: Using breach and attack simulation we first identify the weak points in our network, draw success rates of the attacks based on Infiltration, Lateral Movement and Exfiltration, and finally implement changes to secure the network and bring those success rate closer to 01) IntroductionSimulation of multiple different types of attacks used by hackers to get data out of your networks, clouds and endpoints. This helps to visualize which areas were successfully blocked andwhich weren’t, to help identify key areas and take action against these attacks and finally to remediate the situation. This helps to prioritize results for different types of environments. These thousands of attacks can be categorized in 3 different categories Infiltration, Lateral moves and Exfiltration. Safe breach synthesizes the client’s data and runs them in these simulations to see which blocking methods work successfully, find different data exfiltration pathways and

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 3 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags
Computer Security, Computer network, Attack, attack, Network Time Protocol, Exfiltration Methods

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture