Find out where your “priority country” is or your website will end

When it comes to cybersecurity, knowledge is the first step in protecting yourself.

See your enemies, and your weaknesses.

That’s what Philip Ingram, a senior official at British Military Intelligence, said at the Cybersecurity Festival last week.

“If you know what they are looking for, that is how you will know if you are arrested,” he told the delegates.

“The thing that drives China is the economy, the money, the intellectual property. If you can save billions of dollars by stealing someone else’s development work, then you have to work, it’s safe You can make yourself billions of dollars and then you can use it to get out of the market the fastest way and get financial profit.

Similarly, Russian cyberattacks have been led by power, politics and the military, while North Korea is genuinely motivated by financial gain – mostly through cryptocurrency to avoid sanctions – to change the nature of the nature of the throne.

“I have a problem with Kim Jong Un. How can a country that doesn’t allow its citizens to go to college … become a Tier 2 player? There are only two network pipelines in North Korea. Another of them … went to China; some … went to Russia.

Ingram believes that Russia and China are using North Korea as a patsy, attacking their victims about a separate state to gain the possibility of denial. Again – good knowledge to have, or doubt.

Why should the later attackers be aware of a defense? For the same reason, it is important to know about attack vectors and methods: avoid them. Knowing the nature of the threat and, as a matter of fact, what the attacker will tell you right away if you have an interesting target.

If you have decided that you have a goal, the next step is to see “your main country or key country – the bit you can’t do without.”

“If you can’t understand yourself you’re ending a lot of work,” Ingram said.

And, of course, you can’t forget about your weaknesses: your people, the system and the network. Ingram introduced something called Flipper, a multi-device hacking tool built with open-source technology, small enough to fit in a bag.

“How many of us have policies to actually look for things like this in our employees?”

The way to heal

So you know your biggest threats, your weaknesses and your main reason. What to do next? To prepare for an impossible breach, because if you know everything about your site, no one can be 100% sure they are safe.

Get a plan for the return, and then have a plan for a return for when the first one falls apart. It may seem like a lot of work, but the preparation to navigate a good fall pays off.

“You can recover from the technical side of a cyberattack very quickly, but trying to restore a reputation can take years.”

Hacking groups such as Anonymous, realizing the dangers of this, have moved to attack the name of businesses by releasing data from the companies they have hacked, or calling them online for things that are perceived to be illegal activities (such as continuing to work in. Lukia).

Knowledge, Ingram added, is the key to everything. Decide if you have a goal and use that to refine your skill – before thinking about the nature of the threat vector.

Find out where your “priority country” is or your website will end

Source link Find out where your “priority country” is or your website will end

Back to top button