Artifact analysis for suspicious or malicious content
As a security analyst, you can look for threats that evaded detection by analyzing
reconstructed artifacts, such as files and images. To understand connections
between collaborators and artifacts, you can also investigate the links to and from
these files and images.
Example - Using artifact analysis to find the source of an attack
(patient zero)
John is a security analyst at Replay Industries. Several systems are infected despite
all of security measures that are in place. After he identifies and quarantines these
systems, John needs to find out how these systems became infected and whether
other assets are similarly compromised.
Do'stlaringiz bilan baham: |