welcome to model To listen to common language.
In this lesson, we will appreciate the common language created by attack
and recognize how this common language can help operational teams communicate and collaborate
as security practitioners. We feel the complexity of our craft every day
as it requires many technologies, processes and people to work together.
Not to mention we are flooded with information that comes in at varying levels of detail and format.
But as we know, collaboration and communication across all these resources is key.
This is where the attack common language comes in.
Attack creates a common language that is critical for consistently and accurately sharing ideas about adversary behaviors.
This language is abstracted to an operational level and as many practical use cases,
such as connecting adversary perspective to what we're gonna do about it in terms of defensive countermeasures.
The highlight example. This.
Let's walk through a notional example from a security team.
an Intel analyst notices a command line used by adversaries.
A red team remain recognize that as many cats and tax
and finally, the defensive analyst can write analytic looking for those strings.
While this does, you'll benefit
the lack of context and communicated details may lead to an operational shortcoming. And in this case,
looking back to David Bianco, painter of pain. Strings are pretty low
in terms of cost back to the adversary.
Let's walk that same example
with a context provided by attack.
Each one of these ideas can be enhanced
in this case, looking at that same command line and recognizing this is very common across many groups.
The red team might also use Attack to better decompose the behavior that is executed by that command,
leading to a better analytic that's actually targeting the behavior.
And with that, we start knowledge check for listen to
Attack provides a language that can be used by
please positive video and take a second to think about the correct answer before proceeding.
In this case, the correct answer was E
attack provides a language that can be used by anyone involved in cyber security.
And with that, we've reached the end of Lesson two
in summary attack created language for describing cyber adversary behaviors.
This language is distracted to an operational level and can help connect the adversary perspective of attack to defensive countermeasures