You are on page 1of 5

Running head: Attack Surface Analysis and Threat Prediction With Cyber Threat Intelligence

Attack Surface Analysis and Threat Prediction With Cyber Threat Intelligence

Student's Name

Course

Professor's Name

University

City

Date
Attack Surface Analysis and Threat Prediction With Cyber Threat Intelligence

1. List the issues you had within the lab systems - that did not work or were very abstract:

answer

 My time was limited in all parts I had to keep on adding more 15minutes

 The virtual operating system was responding slowly especially the Linux os with ./amass

enum -d certifiedhacker.com command which was inconvenient to my time limit

2. List the key concepts you learned from each of the exercises:

answer

 I learned how to identify an attack surface in Windows using the Microsoft Attack

Surface Analyzer.

 I learned how to identify the attack surface of a web application using the

OWASP ZAP Attack Surface Detector plugin.

 I learned how to visualize the attack surface using Amass.

 I learned how to integrate OTX pulses into OSSIM.

3.Do you plan to repeat this set of exercises: (IF Yes, which ones & what more do you wish to

get out of them)

answer
Attack Surface Analysis and Threat Prediction With Cyber Threat Intelligence

 Yes, I would like to repeat the exercise of using Amass to understand more how it uses

information gathering and other techniques such as active reconnaissance and external

asset discovery to scrap all the available data software

4. Do you feel that you gained a deeper understanding and perspective of the cyber activities

related to these exercises? (Why / How)

answer

 Yes, I got a deep understanding of OTX is used by security researchers and threat data

producers to share research and investigate new threats. It also provides open access for

all, allowing you to collaborate with a worldwide community of threat researchers and

security professionals

5. Were you able to complete all of the exercises? (if not why)

answer

 Yes

6. Discuss the variances of the threat surfaces in enterprise infrastructure.

answer

Treat surface is the whole of all weaknesses in your endeavor IT frameworks that cyberattackers
can adventure to dispense harm through DDoS assaults, ransomware, and other malware diseases
and information robbery, among others. The arrangement isn't to eliminate IT, yet to ensure that
each IT framework and interaction is safely incorporated into the entire blend
Attack Surface Analysis and Threat Prediction With Cyber Threat Intelligence

coming up next are a portion of the variances of the danger surfaces in a big business framework

Cloud and virtualization

These advances have been a gift from heaven for organizations that would somehow or another
not have had the option to use the force of cutting-edge stockpiling, processing, and application
administrations. The world keeps on getting a compliment, which is magnificent for more
modest organizations that can increase rapidly and turn into a danger to considerably more
enormous scope and set up players

Venture portability

The advanced working environment is nothing similar to what it was 10 years back. Today,
endeavors have embraced adaptable work models, permitting representatives to telecommute,
far-off areas, and in any event, allowing them to get their gadgets (BYOD) to the workplace.
This conveys unrivaled efficiency and business congruity benefits, at the expense of a monstrous
expansion in the surface danger region

Outsider instruments

Constantly, ventures host to utilize third-gathering devices, like Slack, Trello, Google Docs, and
so on These new ideal models infer that your endeavor information should rest with these
outsider specialist co-ops. Naturally, their dangerous surface region turns into yours, as well!

Internet of Things

As time passes, we're approaching when IoT waves will hit the shores. From environment
control to participation recording, from sequential construction system computerization to end
client item use insight, everything could be enormously improved with little, associated and
savvy devices inside ventures. The symptom of a huge danger surface region, be that as it may,
can't be overlooked, as endeavors will have a lot bigger danger surface territories to secure.

References
Attack Surface Analysis and Threat Prediction With Cyber Threat Intelligence

Benjamin Rousey August 22, 2018, Reducing threat surface area in enterprise IT

https://techgenix.com/reducing-threat-surface-area/amp/

You might also like