Cybersecurity Module 2 Lesson 8 Notes
Cybersecurity Module 2 Lesson 8 Notes
Contents
3 Lesson outcomes
3 Introduction
4 An AR-spoofing attack
4 Conclusion
4 References
3 www.shawacademy.com
Lesson objectives
By the end of this lesson, you should be able to:
• Highlight how cyber threat intelligence is used within an enterprise to protect resources.
• Examine how the SOC team can be structured to improve security.
• Stage an ARP-Spoofing/ DOS attack on LANs (DEMO).
Introduction
In this lesson, we will show you how cyber threat intelligence can be used within an enterprise to protect resources and
how to best structure a security operation centre (SOC).
When MITRE ATT&CK or another similar framework is deployed properly in an enterprise network, it lays the foundation
for how cybersecurity analysts should focus on their security system and configure it to be able to withstand an attack.
This fact cannot be overemphasised. Using an available cyber threat intelligence framework makes the company more
threat-informed and puts them in a better position to form a defence strategy against attacks.
The primary goal of setting up a SOC based on the three-coloured teams is to GET SAFE and STAY SAFE – to have a
constant safety perimeter around the enterprise network.
An ARP-spoofing attack
An ARP spoofing, also known as ARP poisoning, is a Man-in-the Middle attack that allows attackers to intercept
communication between network devices.
Conclusion
In this lesson, we explored CTI within enterprise resources, highlighting how and why SOC developed teams are organised.
We also conducted a demonstration of an ARP-Spoofing/DOS attack on a LAN.
References
MITRE Engenuity. (n.d.). Homepage. [online] Available at: https://www.mitre-engenuity.org.
Orion Cassetto Director, Product Marketing (2019). Security Operations Center Roles and Responsibilities. [online]
Exabeam. Available at: https://www.exabeam.com/security-operations-center/security-operations-center-roles-and-
responsibilities/.
www.mcafee.com. (n.d.). What Is a Security Operations Center (SOC)? [online] Available at:
https://www.mcafee.com/enterprise/en-us/security-awareness/operations/what-is-soc.html.