-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Cybersecurity Blue Team Strategies
By :

During the next subsections we will be giving a better understanding of how a Blue Team follows a specific playbook to address the attacks specified in each subsection. Most of the steps are the same but they can follow different ways of determining how an attack is classified. In the following subsections we will be putting forward the following playbooks:
Nowadays, ransomware is a top threat, and their operations will mostly have similar patterns of attack frameworks, tools, and techniques across victims. They will also have similar operations to other ransomware families such as Ryuk and DoppelPaymer. The same applies to how hackers operate using a wide range of ransomware flavors. In summary, it is a requirement to quickly understand their overall pattern of operation.
The main goal of ransomware is to encrypt...
Change the font size
Change margin width
Change background colour