Professional Documents
Culture Documents
Attack Surface Analysis and Threat Prediction With Cyber Threat Intelligence
Student's Name
Course
Professor's Name
University
City
Date
Attack Surface Analysis and Threat Prediction With Cyber Threat Intelligence
1. List the issues you had within the lab systems - that did not work or were very abstract:
answer
My time was limited in all parts I had to keep on adding more 15minutes
The virtual operating system was responding slowly especially the Linux os with ./amass
2. List the key concepts you learned from each of the exercises:
answer
I learned how to identify an attack surface in Windows using the Microsoft Attack
Surface Analyzer.
I learned how to identify the attack surface of a web application using the
3.Do you plan to repeat this set of exercises: (IF Yes, which ones & what more do you wish to
answer
Attack Surface Analysis and Threat Prediction With Cyber Threat Intelligence
Yes, I would like to repeat the exercise of using Amass to understand more how it uses
information gathering and other techniques such as active reconnaissance and external
4. Do you feel that you gained a deeper understanding and perspective of the cyber activities
answer
Yes, I got a deep understanding of OTX is used by security researchers and threat data
producers to share research and investigate new threats. It also provides open access for
all, allowing you to collaborate with a worldwide community of threat researchers and
security professionals
5. Were you able to complete all of the exercises? (if not why)
answer
Yes
answer
Treat surface is the whole of all weaknesses in your endeavor IT frameworks that cyberattackers
can adventure to dispense harm through DDoS assaults, ransomware, and other malware diseases
and information robbery, among others. The arrangement isn't to eliminate IT, yet to ensure that
each IT framework and interaction is safely incorporated into the entire blend
Attack Surface Analysis and Threat Prediction With Cyber Threat Intelligence
coming up next are a portion of the variances of the danger surfaces in a big business framework
These advances have been a gift from heaven for organizations that would somehow or another
not have had the option to use the force of cutting-edge stockpiling, processing, and application
administrations. The world keeps on getting a compliment, which is magnificent for more
modest organizations that can increase rapidly and turn into a danger to considerably more
enormous scope and set up players
Venture portability
The advanced working environment is nothing similar to what it was 10 years back. Today,
endeavors have embraced adaptable work models, permitting representatives to telecommute,
far-off areas, and in any event, allowing them to get their gadgets (BYOD) to the workplace.
This conveys unrivaled efficiency and business congruity benefits, at the expense of a monstrous
expansion in the surface danger region
Outsider instruments
Constantly, ventures host to utilize third-gathering devices, like Slack, Trello, Google Docs, and
so on These new ideal models infer that your endeavor information should rest with these
outsider specialist co-ops. Naturally, their dangerous surface region turns into yours, as well!
Internet of Things
As time passes, we're approaching when IoT waves will hit the shores. From environment
control to participation recording, from sequential construction system computerization to end
client item use insight, everything could be enormously improved with little, associated and
savvy devices inside ventures. The symptom of a huge danger surface region, be that as it may,
can't be overlooked, as endeavors will have a lot bigger danger surface territories to secure.
References
Attack Surface Analysis and Threat Prediction With Cyber Threat Intelligence
Benjamin Rousey August 22, 2018, Reducing threat surface area in enterprise IT
https://techgenix.com/reducing-threat-surface-area/amp/