5
Threats
In this chapter, we will learn more about cyber threats, how they are accomplished, and what blue team members will come across in their work. You will learn about how different threat actors act, and what you should expect from them. It is worth noting that there are innumerable infrastructure infiltrations, data breaches, spear phishing attacks, and brute-force attacks nowadays. There is a wide variety of cyber threats, and they don’t discriminate between individuals and organizations.
In this chapter, we will be dealing with the following:
- What are cyber threats?
- The Cyber Kill Chain
- Internal attacks
- Cyber attack actors
- The impacts of cybercrime
What are cyber threats?
A great blue team member should be able to get into the mindset ...
Get Cybersecurity Blue Team Strategies now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.