Skip to main content
Author(s):
Jerry M. Couretas
Secondary Title
Springer International Publishing
Abstract

The purpose of this chapter is to present a general background on cyber security and defense for analysis and targeting. We will begin with a description of current thinking on cyber security systems, including layered defense. This will be followed by a review of end points, connections, and key network nodes in terms of their vulnerabilities and possible technical tools to secure them. Included in this survey will be a review of the cyber attack cycle, a look at organized malware (e.g., botnets) construction and its detection, and a reflection on the importance of understanding defended network terrain in order to develop a successful network defense strategy. In addition, we will look at the broader context of cyber defense, and how we might incorporate conceptual security architecture approaches (e.g., denial and deception) in order to improve the likelihood of success in securing and defending a network.

Concluding remarks
While deception may provide a “cheap” defensive countermeasure for cyber, it is also the most challenging to implement, due to the necessity of clearly understanding the attacker, his objectives, and how to (mis)guide his traversal of a blue network (Alperovich, 2018). However, the use of a Security Operations Center (SOC ), as discussed in Sect. 6.3.3.1, provides the common operational picture (COP ) that helps with the implementation of policy concepts, like deception, to help the cyber security defender control the flow of information about a defended system to potential attackers.
Deception policies are implemented by processes that use technology solutions. For example, as discussed in Sect. 6.4, Stoll used honey files to track Russian KGB cyber attack operatives in a 1980s US defense network hacking attempt (Stoll, 2005). Other technical security measures include protecting files with blockchain encryption or obfuscating the environment (e.g., honeypots, moving target defense) to protect against a motivated attacker.
Technical solutions, however, do not ensure a successful cyber defense. Zero-day exploits and private key compromise are examples of vulnerabilities that defeat strong technical solutions. Cyber analysis is therefore key to providing network defenders with a clear structuring of how a system is protected at each phase of an attack cycle (Figs. 6.2, 6.3, and 6.5; Table 6.6), which help us to answer the questions posed at the beginning of the chapter.

Reference details

DOI
10.1007/978-3-030-88559-5_6
Resource type
Miscellaneous
Year of Publication
2022
Publication Area
Cybersecurity and defense
Date Published
2022

How to cite this reference:

Couretas, J. M. (2022). Cyber Security and Defense for Analysis and Targeting. https://doi.org/10.1007/978-3-030-88559-5_6 (Original work published 2022)