-
Book Overview & Buying
-
Table Of Contents
CEH v10 Certified Ethical Hacker Study Guide
By :
Defensible Network Architecture
Remember when we talked about the attack life cycle? A defensible network architecture factors in the different stages of the attack life cycle and creates controls that will not only protect against the attacker at each stage of the life cycle but, more important, introduces controls that can allow for monitoring of the environment. The monitoring will provide for the ability to alert on anomalous behaviors. When the expectation is that all businesses will be breached at some point, it’s best to create an environment where these breaches can be detected so they can be responded to. This is what is meant by a defensible network architecture—putting in place controls that will allow operations teams to have visibility into the environment, giving them the ability to respond.
The attack life cycle or cyber kill chain can provide guidance for the development of this architecture. At every layer of the environment, there should be visibility...
Change the font size
Change margin width
Change background colour