Investigating Common Attacks
As a security professional, you aim to stay ahead of adversaries and secure your organisation’s attack surface. An ideal place to begin this journey is to understand your vulnerabilities and recognise how social engineering attacks, malware, and other sophisticated tactics could breach your defences.
Implementing the necessary protections, including a range of processes and procedures, as well as technical and administrative mechanisms that have been executed in an organised manner. However, the best technologies, processes, and procedures are often circumvented or flat-out violated. As a Security Analyst, your role is to detect these occurrences and initiate the appropriate actions to secure company assets. Many tools and technologies are available, and understanding the capabilities of the technologies at your disposal is paramount to providing the required response.
While not meant to cover all possible types of attacks, the following pages will provide workable methods and approaches for investigation and analysis.
Head on over to the subsections for each type of attack; I hope you find the material useful.
Last updated