دانلود کتاب The Threat Hunter’s Handbook: Using Log Analytics to Find and Neutralize Hidden Threats in Your Environment
by ChaosSearch
|
عنوان فارسی: کتاب The Threat Hunter: استفاده از تجزیه و تحلیل Log برای یافتن و خنثی کردن تهدیدات پنهان در محیط شما |
دانلود کتاب
جزییات کتاب
In contrast, threat hunting is the proactive approach of uncovering the threats that linger within the environment. Threat hunting provides a second level of defense, intended to address gaps in the overall cybersecurity architecture by finding and disrupting attackers that have evaded the organization’s automated defenses.
The purpose of this paper is to introduce an effective framework and methodology to threat hunting that enables SecOps teams to plan and conduct hunts that maximize the opportunity to successfully find and disrupt attacks in progress.