hello and welcome to another application of the minor attack framework discussion today. We're going to be looking at defacement now. The objective really of the discussion is just to give you a high level understanding of what effacement is with respect to network infrastructure and technology,
some mitigation techniques and detection techniques as well.
So defacement per the minor attack framework comes in two flavors, internal or external, and in this win, a threat actor may modify visual content available in other of those areas to an enterprise network. Reasons can include delivery of a message claiming credit for an intrusion or just to be
*** right. I mean, internal impact can include changing internal forms or posting disturbing content to internal sites to attempt to get organizations to comply with the request. The more uncomfortable I make you, hopefully the more quickly you're going to give me Bitcoin to go away. External can be defacement of a website or other externally facing
mitigation activities here are really going to be conducting regular backups of systems so that when something is impacted, you can quickly reverted back to its original state. But one would have to ask you know if the Threat actor is still present, that they just won't change the system again.
Detection here could be monitoring internal and external sites for unplanned changes so that you could act as quickly as possible when those things come up.
So with that, let's do a quick check on learning. True or false defacement is when a site, internally or externally, is changed to some other content, possibly disturbing without approval.
All right, well, if you need additional time to answer this question, please pause the video. In this case, this is a true statement. Defacement is when we take a sight inside or out and make changes to its content without approval to disturb, make intimidated or anything of the above two
the owners of that site.
So in summary of today's discussion, we looked at and described effacement. We looked at mitigation techniques, and we describe detection techniques as well. And with that, I want to thank you for your time today, and I look forward to seeing you again soon.