Community Platform
Interests
  • Accessibility
  • Agile
  • Analytics
  • App development
  • more...
This Year
No Points
Total
1005 Points
MIS Badge

Click here
to validate the recipient

Learn to Defend Against Multi-Stage Network Breaches in 40 Minutes

Organization: NetCom Learning

Where: virtually on Thursday, September 22 at 1pm – 1:40pm

I learned about multi stage attacks and how it usually includes an initial dropper file, a main payload component of the malware, and additional modules delivered over a period of days, weeks, or more. These attacks are making network defense difficult since they use multiple attack methods and payloads for the maximum impact. The three key techniques to perform forensic analysis is preparation/extraction, identification, and analysis. There are tools and applications like Autopsy/theSleuth Kit, EnCase, and FTK Imager that can help with this process. The Sleuth Kit is a command-line tool that generates forensic analysis of forensic images of smartphones and hard drives. EnCase is an application that aids in retrieving evidence from hard drives and allows in-depth analysis of files to collect proof like pictures and documents. FTK Imager is a data preview and imaging tool used to obtain data by creating copies of data without making changes to the original data.

This relates to my career goals because knowing the right tools and methods to defend a multi-attack network attack could be very useful to a company or organization.

Skip to toolbar