๐Ÿš€ Day 3: Exploring Common Tactics in Cybersecurity Threats

alice eneyoalice eneyo
2 min read

Today, I continued my journey by delving into the tactics used by threat actors to manipulate individuals and exploit vulnerabilities. Understanding these strategies is essential for enhancing our defenses and safeguarding both digital and physical assets.

๐Ÿ” Key Tactics Used by Threat Actors:

  1. Intimidation & Threats

  2. Consensus/Social Proof

  3. Scarcity

  4. Familiarity

  5. Trust

  6. Urgency

๐Ÿ“š Exploring the CISSP Security Domains:

  1. Asset Security: Protecting digital and physical assets from threats.

  2. Security Architecture and Engineering: Implementing tools and processes to optimize data security.

  3. Communication and Network Security: Safeguarding physical and wireless communication networks.

  4. Identity and Access Management: Ensuring only authorized users have access to data, preventing breaches.

  5. Security and Risk Management: Setting security goals, ensuring compliance, and maintaining business continuity.

  6. Security Assessment and Testing: Regularly testing and assessing security measures to validate their effectiveness.

  7. Security Operations: Actively maintaining and monitoring security measures to counter ongoing threats.

  8. Software Development Security: Integrating security into the software development lifecycle to prevent vulnerabilities.

๐ŸŒ Enhancing Cybersecurity Through Structured Policies and Security Testing:

  1. Security Control and Management: Establishing policies for controlling and managing physical and logical assets.

  2. Security Assessment and Testing: Conducting thorough security control testing, collecting and analyzing data, and performing audits.

  3. Security Operations: Proactively investigating incidents and implementing preventive measures.

  4. Software Development Security: Secure coding practices are crucial in creating secure applications and services.

๐Ÿ’ผ Why Cybersecurity Matters:

  • Protecting sensitive information and ensuring privacy.

  • Preventing financial loss and guarding against identity theft.

  • Maintaining business continuity, protecting organizational reputation, and enhancing customer trust.

Understanding these tactics and critical CISSP security domains is key to building a resilient defense against cyber threats. The journey continues, and Iโ€™m excited to keep learning and growing in this ever-evolving field. Remember: You canโ€™t retire from being great!

#Cybersecurity #LearningJourney #CISSP #ThreatAwareness #InformationSecurity #TechSkills #Coursera


10
Subscribe to my newsletter

Read articles from alice eneyo directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

alice eneyo
alice eneyo

Iโ€™m an experienced Governance, Risk, and Compliance (GRC) Analyst skilled in aligning regulatory requirements with Cybersecurity. My expertise includes Risk Management, IT Governance, Data Privacy, and Incident Management, with a focus on safeguarding companies and enhancing operational efficiency. Key skills: Effective communication and stakeholder engagement Strong time management and adaptability Detail-oriented with excellent analytical abilities Experience highlights: Risk Assessment, Business Continuity, Disaster Recovery, Incident Response Planning Policy and procedure creation for regulatory compliance Training on Security Best Practices Familiar with frameworks like PCI DSS, NIST CSF, GDPR, and NDPR. Iโ€™m passionate about staying current with industry trends and eager to contribute to dynamic organizations. For collaboration opportunities, contact me at aliceeneyo@gmail.com.