Completed
Infosec Failures
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Threat Activity Attribution - Differentiating the Who from the How
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Traditional Attribution
- 3 Benefits
- 4 Drawbacks
- 5 Infosec Failures
- 6 Media Examples
- 7 What Attribution Should Do
- 8 Results of Attribution
- 9 Goals of Attribution
- 10 Operations vs. Identity
- 11 Attribution Limitation
- 12 Introducing the Diamond Model
- 13 Infrastructure - Atomic
- 14 Infrastructure - Behavioral
- 15 Capabilities - Behavioral
- 16 ALLANITE aka PALMETTO FUSION
- 17 Distinctions
- 18 ALLANITE Phishing
- 19 Targeting Differences
- 20 Diamond Model Evaluation
- 21 Implications
- 22 COVELLITE Publicity
- 23 COVELLITE Document
- 24 COVELLITE and LAZARUS
- 25 The Problem with LAZARUS
- 26 The Defender Problem
- 27 Make Defense Manageable
- 28 Process