Detect and Respond To Attacks Aim
Detect and Respond To Attacks Aim
Detect and Respond To Attacks Aim
Threat detection is the number one priority for cybersecurity teams. If you don’t even see the bad
guys in your network, you will not be able to respond appropriately. But with so many potential
threats and adversaries, putting in place appropriate threat detection, like UEBA, can seem a
daunting task. Throw in a bunch of marketing buzzwords and cyber terms of art and it’s even
harder to establish a clear strategy. Breaking down threat detection and response to the most
basic elements can bring that clarity.
you will learn:
What is threat detection?
What are attackers after?
What are examples of threats?
How to detect threats
How to hunt threats
How to respond to threats
What is threat detection?
As the term relates to computer security, a threat refers to anything that has the potential to cause
harm to a computer system or network. Importantly, as Techopedia points out, threats are not the
same as attacks. Threats represent the potential for attacks to occur; attacks are the act of
breaking in or harming a computer or network. A more advanced form of threat, the Advanced
Persistent Threat (APT), emerged several years ago. As the name suggests, the threat is
sophisticated and remains in your network for a prolonged period of time, giving attackers a
longer window to act.
Threat detection is the process by which you find threats on your network, your systems or your
applications. The idea is to detect threats before they are exploited as attacks. Malware on an
endpoint, for example, may or may not have been exploited in an attack. For that reason, security
teams have been shifting their focus from so-called indicators of compromise (IoC), like a
malware infection, to techniques, tactics, and procedures (TTPs). The goal is to catch the bad
actor in the process of introducing a threat by watching for telltale techniques versus finding
evidence that a threat was already introduced by finding an IoC.
Detection
Overview Pros Cons
Technology
Limited in scope to
Cloud access cloud applications; do
Detect unauthorized Good view of
and security not detect threats
access to cloud access patterns to
brokers within cloud
applications. cloud applications.
(CASB) applications
themselves.
Record suspicious
Complete
Endpoint behavior, block Limited in scope and
technology for
detection and malicious access, do not detect network
protecting endpoint
response and suggest or server attacks.
computers.
responses.
A physical or
virtual appliance
Good for detecting Limited in scope and
that monitors traffic
Network and blocking will not detect
for malicious
firewalls threats via the endpoint or cloud
activity or access
network itself. threats.
and takes
appropriate action.
Limited in scope the
A network-attached
Advanced visibility specific honeypots
system set up as a
of threats against that are deployed. If
Honeypots decoy to expose
applications or discovered by an
threats against an
resources. attacker, honeypots
organization.
can be circumvented.
Advanced technology
Able to detect that detects unknown
Behavior Detects threats unknown threats by threats by creating a
analytics based on behavior. using behavior and baseline that
machine learning. demonstrates behavior
and data insights.
User and entity behavior analytics (UEBA) is a new category of security solutions that uses
analytics technology, including machine learning and deep learning, to discover abnormal and
risky behavior by users, machines and other entities on the corporate network.
UEBA can detect security incidents that traditional tools do not see, because they do not conform
to predefined correlation rules or attack patterns, or because they span multiple organizational
systems and data sources.
Threat hunting
Threat hunting is the practice of actively seeking out cyber threats in an organization or network.
A threat hunt can be conducted on the heels of a security incident, but also proactively, to
discover new and unknown attacks or breaches. According to a 2017 study by the SANS
Institute, 45% of organizations conduct threat hunting on an ad hoc or regular basis. Threat
hunting requires broad access which can be provided by a SIEM to security data from across the
organization.
Once a threat turns into an incident, a different type of response is required. An incident response
plan helps IT staff identify, respond to and recover from cybersecurity incidents. The objective
of an incident response plan is to prevent damages like service outage, data loss or theft, and
illicit access to organizational systems. Some organizations have formalized a cross-
functional incident response team.
Understanding threats allows your organizations to respond appropriately to them. Leveraging
advanced frameworks like MITRE ATT&CK improves the sophistication of security teams.
With behavioral analytics and threat hunting tools a SOC analyst can proactively apply security
solutions. And when threats turn into incidents, automation and an organized incident response
team can help speed recovery.
Result:
Thus the various threat detection and responses and how to stay ahead of advanced
threats were studied.