Summary
In this chapter, you have learned about various models that security professionals employ to understand cyber attacks. Models such as the Cyber Kill Chain and the Diamond Model of Intrusion Analysis help SOCs to have an idea of what a threat actor was attempting to achieve and what actions were taken during an incident. Furthermore, you have learned how to identify the characteristics of protected data within organizations and learned about the need to ensure that systems are secure at all times to prevent hackers from stealing PII, PHI, and PSI.
I hope that this chapter has been informative for you and will be helpful on your journey to learning the foundations of cybersecurity operations and gaining your Cisco Certified CyberOps Associate certification.
In the next chapter, you will learn how to implement various security technologies within a Cisco environment.