Week 9 Posting - Identifying and Prioritizing Threats
In the world that we live in there are often people who disagree, some fight it out in twitter or in a boxing ring, however there are some unethical ways people have started silent wars, this includes cyber-attacks on another person’s life or business. In chapter 13 the topic included how to be prepared for threat hunting and uncovering the more difficult attacks. With each attack there is typically a motive, for countries it is often access to sensitive data or disabled a system, for companies it is similar, often companies that run ads for the first time may run into an unintentional DDoS by customers trying to access a resource. The best thing a cybersecurity engineer can do is to help train an maintain systems to filter out the fake traffic versus the real customers.
Comments
Post a Comment