Digital transformation through effective cybersecurity
  • Digital Transformation
  • Corporate Cybersecurity
  • Security / IT Primer
  • Advisory Services
  • Contact

Defender vs. Attacker

  • Defender is in the “position of the interior”
  • Defender serves an organizations goal; attackers have unlimited resources
  • Defender must defend all points; attackers targets the single weakest link
  • Defender can only defend against known attacks; attackers can probe for unknown vulnerabilities
  • Defender must be constantly vigilant; attackers can strike at will
  • Defender must play by the rules; attackers can play dirty
  • Attackers can use technology of the future that’s not available to the defender
  • Defenders security depends not only on its own investment and effort, but also dependent on the security of others
    • Even if a company proactive on cybersecurity, its partners may not be
    • Attackers are proactive about finding the weakest link in a value chain
      • i.e., Service providers, suppliers, third party (and fourth party) vendors
      • e.g., Company A might be secure, so attackers will attack their (less protected) law firm
  • Data is becoming less centralized
    • Changing from protecting the data center and its perimeter to…
    • … the actual data itself via access management, DLP, encryption and authentication
Hooded man with face in darkness typing at a keyboard with light blue colored numbers rising up over his hands. Streams of light and the dark shape of the world map are in the background.

Types of Attackers

 

Class I – Clever Outsiders

  • Very intelligent but insufficient knowledge of the system
  • Have access to moderately sophisticated equipment
  • Take advantage of existing weakness 

Class II – Knowledgeable Insiders

  • Substantial specialized technical expertise
  • Varying degree of understanding with potential access to most of the system
  • Have highly sophisticated tools and analysis instruments

Class III – Funded organization (i.e., Nation states)

  • Team of specialists with great funding resources
  • Capable of in-depth analysis, designing sophisticated attacks and using the most advanced tools
  • They may use Class II adversaries as part of the attack team

Let us help you change your mindset and address cybersecurity

Cybersecurity
  • General Security Concepts
  • Aspects of Cybersecurity
  • People and Cybersecurity
  • Defender vs. Attacker
  • Complexity vs. Security
  • Resilience vs. Reliability
  • Cyber Hygiene
  • Testing
  • Threats Modeling
  • Traditional vs. IT Domains
  • Traditional vs. IT / Security Engineering
  • What is PCI DSS?
  • Cyber Insurance
  • 5G
  • Aviation
Tweets by intecur
About | Privacy Policy | Cookie Policy | Sitemap
Intecur, Inc. Copyright © 2020 All Rights Reserved.
Log in Log out | Edit
  • Digital Transformation
    • Digital Transformation - Definition
    • The Reality
    • The New Global "M's"
    • Global Trends
    • COVID-19
    • Issues & Challenges
    • Strategy
    • What Stage is Your Organization?
  • Corporate Cybersecurity
    • Cybersecurity Today
    • Corporations
    • Executives
    • Compliance
    • Benefits
    • Strategy
    • Security by Design
  • Security / IT Primer
    • General Security Concepts
    • Aspects of Cybersecurity
    • People and Cybersecurity
    • Defender vs. Attacker
    • Complexity vs. Security
    • Resilience vs. Reliability
    • Cyber Hygiene
    • Testing
    • Threats Modeling
    • Traditional vs. IT Domains
    • Traditional vs. IT / Security Engineering
    • What is PCI DSS?
      • PCI Levels
      • PCI Compliance
    • Cyber Insurance
      • Coverage
      • Qualities
    • 5G
    • Aviation
      • Aviation Systems
      • Aviation Networks
  • Advisory Services
    • CISO-as-a-Service
    • Experience
    • Acronym Glossary
  • Contact
    • About Us
    • Partner Login
  • Scroll to top
Close