Answered step by step
Verified Expert Solution
Question
1 Approved Answer
4 . Identify how the NIST CSF applies to offensive cybersecurity. Understanding the mind of an attacker is fundamental to securing your organization or aspects
Identify how the NIST CSF applies to offensive cybersecurity.
"Understanding the mind of an attacker is fundamental to securing your organization or aspects of your personal life. After all, if you aren't doing the job of viewing things from an attacker's perspective, that means that only the attackers are. The idea is to understand the mindset, motivations, and capabilities of a possible threat actor so that you aren't simply oblivious to your vulnerabilities."
The CyberWire
As a network defender, you need to predict and protect against every possible combination of attack scenarios. But, on the other hand, as an attacker, you only need to find one way to get into a system or environment. Moreover, attackers always look for the weakest avenue to exploit that requires the least effort and cost on their part but still yields a sizable reward. To accomplish this, they often think outside the box and look at things through a unique attacker's mindset. You may have heard the phrase "attacker's mindset" or "think like an attacker" before, but what does it mean? In simple terms, the goal behind these phrases is to encourage people to get inside the head of the groups targeting them and try to predict how they would abuse a system, process, or human element to achieve a malicious objective.
To practice the attacker mindset, take what you have learned so far about the NIST CSF and see it through the lens of an attacker.
To prepare for this exercise, first listen to Embrace an Attacker Mindset to Improve Security, a podcast that takes a deeper dive into the attacker mindset. Then, review Lockheed Martin's Cyber Kill Chain E a model for identifying and preventing cyber intrusions. This particular resource elegantly puts the attacker's goals and defender's actions for each step of the kill chain side by side.
Answer the questions in your writeup:
What is your takeaway from the podcast?
What did you find most interesting?
How can you view the world through the attacker's mindset?
Using the resource Getting Started with the NIST Cybersecurity Framework: A Quick Start Guide as a starting point, can you identify how the NIST CSF can be used for the offensive purpose? Conceptually, which of the CSF functions do you think you would be able to evade and how?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started