Delving into the Diamond Model of Intrusion Analysis
Cybersecurity teams use the Diamond Model of Intrusion Analysis to understand how a threat actor achieves their goal of compromising their targets. Every day, we hear and read about various cyber attacks around the world and how cybersecurity professionals are working to always be one step ahead of cyber criminals.
Whenever an intrusion occurs within an organization, the blue team is responsible for incident response to ensure that the intrusion is identified, contained, and eradicated, and that systems are restored to their working state. However, when an intrusion or security incident occurs on a system or network, there is wisdom to be gained. Cybersecurity professionals can gather data about the intrusion that occurred on their systems and align each key factor to the Diamond Model of Intrusion Analysis. This helps to create a visual representation of how the adversary (threat actor) was able to compromise the victim (target...