YOOB1015-M001
Cyber Security
2.1 Identifying Active Threats
Active threats represent risks to business operations that need to be identified and monitored. Open-source intelligence (OSINT) and threat-intelligence sharing platforms are highly effective ways to do this. With OSINT, a wide range of publicly available information is collected and analyzed to identify potential threats. OSINT sources are diverse and include social media, blog posts, news articles, chat forums, and many other sources.
2.0 Exploring Threat Intelligence and Threat Hunting Concepts
Threat intelligence and threat hunting encompass the strategies used to detect and protect against active threats. Threat intelligence describes gathering and analyzing data to help identify potential threats and determine the most effective way to mitigate them. Threat intelligence enables the proactive identification of malicious activity and the capabilities and objectives of different threat actor groups. In addition, threat hunting describes actively searching for signs of malicious activity on an organization’s network.
Patch Management Concepts
Patch management is an essential part of IT security. It involves regularly monitoring, assessing, and updating an organization's software, such as operating systems, applications, and device drivers. Patch management aims to ensure organizations have the latest security updates and patches to protect their systems from potential vulnerabilities. It should also include a plan for applying these patches promptly and a backup plan in case of disruptions.
Control Types and Methods
Security controls are an integral part of any organization's security strategy. They help reduce risk by minimizing the attack surface and addressing vulnerabilities. Security controls can include technical measures, such as firewalls and encryption, and nontechnical measures, such as employee training and awareness. Security controls can help protect an organization's valuable assets and data from unauthorized access, theft, and destruction when implemented correctly.
Cybersecurity Leadership Concepts
Cybersecurity Deployment and Management works top to bottom. A cybersecurity leader is responsible for creating a vision and setting goals for a team to secure an organization's assets. Additionally, they must understand the technical and legal aspects of the industry and be able to advise on the best approaches for providing appropriate levels of protection. Leaders must have a deep understanding of the industry and its nuances and the ability to make decisions quickly and confidently.