Big data can catch hackers
HP security chief: How big data can catch hackers red-handed | ZDNet:
" . . . The breach process can be broken down into five distinct phases in a chain originally devised by Lockheed Martin, according to Gilliland. The first stage is research, when the would-be intruders study systems and staff, a process made far easier by employees' fondness for Facebook. Stage two is infiltration — when the criminals break in — followed by the third phase, known as discovery, which involves mapping the internal environment to survey systems and identify the location of the most sensitive data. The fourth step is capture. "High 90 percent of the time it's intellectual property or customer data or some sort of information. . . . Finally comes exfiltration. "That's the fancy military term for 'Get the data out of there'. . . ." (read more at link above)
No comments:
Post a Comment