this post was submitted on 26 Dec 2024
10 points (100.0% liked)
Cyber Security
65 readers
2 users here now
๐ต๐ฟ Surveillance, Information security, Cybersecurity, Interoperability, Analytics, Data tracking, Digital Disinformation, Decentralised Finance, Algorithmic Sovereignty & Privacy By Design.
Questions and answers are encouraged. Be excellent to each other. ๐๏ธ
founded 7 months ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
After threat modelling, consider reading The Diamond Model of Intrusion Analysis to assist in operational incident and control measures, especially to catch APTs.