Menu

2.6 Given a scenario, use processes to reduce risk.

Proactive and detection

 Hunts

 Developing countermeasures

 Deceptive technologies

  Honeynet
  Honeypot
  Decoy files
  Simulators
  Dynamic network configurations

Security data analytics

 Processing pipelines

  Data
  Stream

 Log collection and curation

 Database activity monitoring

Preventive

 Antivirus

 Immutable systems

 Hardening

 Sandbox detonation

Application control

 License technologies

 Allow list vs. block list

 Time of check vs. time of use

 Atomic execution

Security automation

 Cron/scheduled tasks

 Bash

 PowerShell

 Python

Physical security

 Review of lighting

 Review of visitor logs

 Camera reviews

 Open spaces vs. confined spaces