Common Language

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
1 hour
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:01
welcome to model To listen to common language.
00:06
In this lesson, we will appreciate the common language created by attack
00:10
and recognize how this common language can help operational teams communicate and collaborate
00:19
as security practitioners. We feel the complexity of our craft every day
00:23
as it requires many technologies, processes and people to work together.
00:28
Not to mention we are flooded with information that comes in at varying levels of detail and format.
00:35
But as we know, collaboration and communication across all these resources is key.
00:42
This is where the attack common language comes in.
00:46
Attack creates a common language that is critical for consistently and accurately sharing ideas about adversary behaviors.
00:53
This language is abstracted to an operational level and as many practical use cases,
00:57
such as connecting adversary perspective to what we're gonna do about it in terms of defensive countermeasures.
01:04
The highlight example. This.
01:07
Let's walk through a notional example from a security team.
01:11
In this case,
01:14
an Intel analyst notices a command line used by adversaries.
01:18
A red team remain recognize that as many cats and tax
01:22
and finally, the defensive analyst can write analytic looking for those strings.
01:27
While this does, you'll benefit
01:30
the lack of context and communicated details may lead to an operational shortcoming. And in this case,
01:36
looking back to David Bianco, painter of pain. Strings are pretty low
01:40
in terms of cost back to the adversary.
01:47
Let's walk that same example
01:49
with a context provided by attack.
01:51
Each one of these ideas can be enhanced
01:53
in this case, looking at that same command line and recognizing this is very common across many groups.
02:00
The red team might also use Attack to better decompose the behavior that is executed by that command,
02:06
leading to a better analytic that's actually targeting the behavior.
02:13
And with that, we start knowledge check for listen to
02:15
Attack provides a language that can be used by
02:19
please positive video and take a second to think about the correct answer before proceeding.
02:27
In this case, the correct answer was E
02:29
attack provides a language that can be used by anyone involved in cyber security.
02:36
And with that, we've reached the end of Lesson two
02:38
in summary attack created language for describing cyber adversary behaviors.
02:43
This language is distracted to an operational level and can help connect the adversary perspective of attack to defensive countermeasures
Up Next