Talk With an Expert

Following a Breach Simulating and Detecting a Common Attack

Following a Breach Simulating and Detecting a Common Attack (PDF, 2.45MB)Published: 14 Aug, 2015
Created by
Dale Daugherty

Modern networks are designed with multiple layers of preventive and detective controls. Even with these controls, networks continue to be breached and these breaches can go unnoticed for months. While preventive measures cannot stop all attacks and exploits, detective measures should be able to identify intrusions and malicious activity in a timely manner. The ability to detect this activity depends on the kinds of intrusion monitoring systems in place and the analysts' ability to recognize and act on the alerts. This paper will outline the anatomy of a common attack, simulate the steps in an attack; including elements from the recent breach of Sally Beauty Supply, and determine how an attack can be detected.