this post was submitted on 26 Dec 2024
9 points (100.0% liked)
Cyber Security
118 readers
1 users here now
๐ต๐ฟ Surveillance, Information security, Cybersecurity, Interoperability, Analytics, Data tracking, Digital Disinformation, Decentralised Finance, Algorithmic Sovereignty & Privacy By Design.
Questions and answers are encouraged. Be excellent to each other. ๐๏ธ
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
After threat modelling, consider reading The Diamond Model of Intrusion Analysis to assist in operational incident and control measures, especially to catch APTs.