Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

4 . Identify how the NIST CSF applies to offensive cybersecurity. Understanding the mind of an attacker is fundamental to securing your organization or aspects

4. Identify how the NIST CSF applies to offensive cybersecurity.
"Understanding the mind of an attacker is fundamental to securing your organization or aspects of your personal life. After all, if you aren't doing the job of viewing things from an attacker's perspective, that means that only the attackers are. The idea is to understand the mindset, motivations, and capabilities of a possible threat actor so that you aren't simply oblivious to your vulnerabilities."
-The CyberWire
As a network defender, you need to predict and protect against every possible combination of attack scenarios. But, on the other hand, as an attacker, you only need to find one way to get into a system or environment. Moreover, attackers always look for the weakest avenue to exploit that requires the least effort and cost on their part but still yields a sizable reward. To accomplish this, they often think outside the box and look at things through a unique attacker's mindset. You may have heard the phrase "attacker's mindset" or "think like an attacker" before, but what does it mean? In simple terms, the goal behind these phrases is to encourage people to get inside the head of the groups targeting them and try to predict how they would abuse a system, process, or human element to achieve a malicious objective.
To practice the attacker mindset, take what you have learned so far about the NIST CSF and see it through the lens of an attacker.
To prepare for this exercise, first listen to Embrace an Attacker Mindset to Improve Security, a podcast that takes a deeper dive into the attacker mindset. Then, review Lockheed Martin's Cyber Kill Chain E, a model for identifying and preventing cyber intrusions. This particular resource elegantly puts the attacker's goals and defender's actions for each step of the kill chain side by side.
Answer the questions in your write-up:
. What is your takeaway from the podcast?
What did you find most interesting?
How can you view the world through the attacker's mindset?
. Using the resource Getting Started with the NIST Cybersecurity Framework: A Quick Start Guide as a starting point, can you identify how the NIST CSF can be used for the offensive purpose? Conceptually, which of the CSF functions do you think you would be able to evade and how?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Modeling And Design

Authors: Toby J. Teorey, Sam S. Lightstone, Tom Nadeau, H.V. Jagadish

5th Edition

0123820200, 978-0123820204

More Books

Students also viewed these Databases questions

Question

Evaluate employees readiness for training. page 275

Answered: 1 week ago