Page 51 - Dataquest
P. 51

INTEllIGENT COMPUTING | SECURITY







































          transition to cloud services? The intensity of a potential   focused  on  outsmarting  a  skilled  human  attacker  on
          malicious breach?                               the other side.

          SIGNIfICaNCE Of ThrEaT hUNTING                  valUE PrOPOSITION Of ThrEaT hUNTING fOr aN
          This is where Threat Hunting can play a key part. Threat   OrGaNIZaTION
          Hunting is a proactive and iterative approach to security and   Immeasurable sums of money, manpower and time has
          enables the company to answer the questions above. In es-  been invested in developing a resilient security infrastruc-
          sence, it is the process of looking for the traces of attack-  ture. However, organizations still struggle to identify and
          ers (past and present) in your IT environment. The process   respond  to  cyber  intrusions  in  a  timely  manner.  Threat
          helps find those traces before any alerts of their activities   Hunting  has  recently  emerged  as  a  proactive  defense
          are generated by security devices. Threat Hunting enables   asset capable of methodically detecting and responding
          the company to consistently address the following:  to advanced security threats that bypass the traditional
          l  Maintain a continuous threat awareness       rule or signature-based security solutions. An Organiza-
          l  Hunt for unknown behavioral based anomalies  tion  equipped  with  Threat  Hunting  is  better  enabled  to
          l  Analyze threat intelligence feeds and convert it into ac-  uncover hidden and entrenched threats as it reduces the
          tionable tasks                                  attack  surface  resulting  from  discovered  and  removed
          l  Aid in providing input to monitoring team    weaknesses.  Threat  Hunting  allows  for  sweeping  sys-
                                                          tems clean before a critical mission or business transac-
          kEy CharaCTErISTICS Of ThrEaT hUNTING           tion. It paves the way to validate that the controls, - both
          Threat  Hunting  is  an  analyst-centric  process  which   preventative and detective are actually working, and no
          requires a  significant investment  of  personnel, equip-  threats are entrenched in the environment.
          ment,  and  time.  The  advanced  knowledge  a  hunter   Threat  Hunting  is  a  way  to  flip  the  age-old  security
          possesses  of  the  Enterprise  Threat  Landscape  and   maxim, “the defender needs to close all holes, but the at-
          his Data Analysis skills are the primary two aspects of   tacker needs to just find one hole to get in.” Specifically,
          threat  hunting.  It  is  not  about  waiting  for  an  alert  or   with hunting, an attacker’s sole mistake is likely to lead to
          another signal; rather, it’s about going and looking for an   their discovery and removal, while the defender can cast
          intruder before any alerts are generated. Most experts   its net many times to find the mistake.
          agree that hunting is not about following the rules, but
          about  a  creative  process  and  a  loose  methodology        (The author is Solution Architect, LTI)

                                   |  A CyberMedia Publication   www.dqindia.com          January, 2018   |  51
   46   47   48   49   50   51   52   53   54   55   56