This document discusses the evolution of cybersecurity threats and defenses over time. It describes how threats have evolved from early viruses distributed via email to today's targeted attacks and advanced persistent threats. It also outlines how security defenses have evolved from early antivirus software and firewalls to today's next-generation firewalls, endpoint protection, cloud security, and use of machine learning. The document argues that isolated security tools are ineffective, and an integrated platform is needed to effectively defend organizations across networks, endpoints, and clouds in today's digital era.
21. LA ANATOMIA DE UN ATAQUE EXITOSO
Connectivity
rate change
Vulnerability
Exploit
Malware
Installation
Command
and Control
Lateral
Movement
Data
Exfiltration
Repeated access
to an unusual site
Unusually
large upload
• Ocurre en segundos o minutos
• Involucra un numero menor de acciones en la red
• Puede ser identificado por IoCs
• Ocurre durante días, semanas o meses
• Involucra un gran numero de acciones en la red
• Dificilmente identificado por IoCs