Various types of threats exists in our network and we need to be able to discover them before any harm is done. However, not all threats are easily detectable and needs behavior analysis. User and entity behavior analysis (UEBA) is one of the methods which is employed to detect threats using machine learning techniques. Hunting for a threat requires going through each steps in cyber kill chain. Following picture gives an overview of what cyber kill chain is composed of
After successfully implementing cyber kill chain in your infrastructure following are the threats you can discover through hunting process...
Happy hunting!!!
No comments:
Post a Comment