UC Thinking Like Attacker Discussion

User Generated

Znqquryn

Writing

University of the Cumberlands

Description

Describe techniques applied or approaches taken that can reduce the size of the attack surface of a system.

Describe what it means to think like an attacker.



User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head/approaches taken that can reduce the size of the attack surface of a system.

1

APPROACHES TAKEN THAT CAN REDUCE THE SIZE OF THE ATTACK SURFACE OF
A SYSTEM.
NAME
INSTITUTION
DATE

Approaches taken that can reduce the size of the attack surface of a system.

2

In the most straightforward terms, the "attack surface" is the whole of assets presented to
misuse inside your endeavor. Shielding the attack surface was much less confused when a
characterized corporate "border" existed, entirely isolating an organization's benefits from the
outside world.
Cutting edge advancements (e.g., distributed computing and programming characterized
organizing) have disintegrated the edge, causing the attack surface to develop exponentially. The
Internet of Things (IoT) is a genuine case of how the lucky opening for cybercriminals has
exposed. Any gadget associated with the web would now be able to be the objective of a cyberattack (Bernstein, D. J, et al. 2017).
In this time of complex foundations and advanced malware, we should remain laserconcentrated on diminishing the attack surface to confine the open doors accessible to
cybercriminals. Here are five different ways to do as such.
1. Eliminate Complexity
A standout amongst the most significant approaches to lessen the attack surface is by
disposing of pointless unpredictability, which can crawl into the best of systems after some time.
Multifaceted nature is regularly the consequence of inadequate approach the executives or
fragmented data during guideline creation. Pointless multifaceted nature hoists the likelihood of
human blunder and hazard, underscoring the significance of effortlessness in security
foundations and approach the board (Shehab, M., and AlJarrah, A, 2014).
2. Visualize Your Vulnerabilities
Vulnerability scanne...


Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags