5 steps to prevent insider attacks

DTEX and the Insider Threat Kill Chain

Cover

Most security threats follow a pattern of activity during an attack, and insider threats are no exception. Lockheed Martin’s Cyber Kill Chain outlines the steps that APT attacks tend to follow from beginning to end. Since human behavior is more nuanced than machine behavior, however, insider attacks follow a slightly different path.

You must ask, ‘What was the user’s intent?’, ‘What it truly an insider, or were credentials compromised?’, ‘If so, how did the credential thief get into the account?’.

Preventing these attacks requires visibility and intelligence.

Read on to learn about the Insider Threat Kill Chain, which encompasses the 5 steps present in nearly all insider attacks.

Vendor:
Dtex
Posted:
14 Aug 2020
Published:
14 Aug 2020
Format:
PDF
Length:
9 Page(s)
Type:
eBook
Language:
English
Already a Bitpipe member? Login here

Download this eBook!