SlideShare a Scribd company logo
1 of 8
Download to read offline
IOC
INDICATOR OF
COMPROMISE
IOA
INDICATOR OF
ATTACK
EVERYTHING ABOUT
IOA VS IOC
#
l
e
a
r
n
t
o
r
i
s
e
Swipe
www.infosectrain.com
IOA or Indicator of Attack, is a pattern of behavior
that indicates that a cyber attack is in progress or
is about to happen. IOAs are based on the
knowledge of how attackers typically operate,
and they can be used to detect a wide range of
attacks.
EXAMPLE
โ€ข A sudden increase in the number of failed login
attempts to a system.
IOA
#
l
e
a
r
n
t
o
r
i
s
e
Swipe
www.infosectrain.com
IOC or Indicator of Compromise, is a piece of
evidence that indicates that a system has been
compromised. IOCs can be anything from a
speci๏ฌc IP address to a ๏ฌle hash to a registry
entry. IOCs are often used to detect known
threats, such as speci๏ฌc malware strains or
attack vectors.
EXAMPLE
โ€ข The presence of a speci๏ฌc malware ๏ฌle on a
system.
IOC
#
l
e
a
r
n
t
o
r
i
s
e
Swipe
www.infosectrain.com
1. De๏ฌne Objectives
โ€ข IOA: Identify the objectives for detecting mali
cious activities before they compromise the
system.
โ€ข IOC: De๏ฌne the goals for identifying signs of
a successful breach or compromise.
2. Gather Data
โ€ข IOA: Collect data on attack tactics,
techniques, and procedures (TTPs).
โ€ข IOC: Gather logs, network traf๏ฌc data, and
system events.
HOW TO BUILD
#
l
e
a
r
n
t
o
r
i
s
e
Swipe
www.infosectrain.com
3. Analyze Threat Intelligence
โ€ข IOA: Analyze threat intelligence feeds,
reports, and forums for emerging threats and
attack patterns.
โ€ข IOC: Review threat intelligence for known
signatures, malware hashes, malicious IPs,
and domains.
4. Develop Indicators
โ€ข IOA: Develop indicators based on observed
attack behaviors, anomalies, and patterns.
โ€ข IOC: Create indicators using known
compromised elements such as ๏ฌle hashes,
IP addresses, URLs, and email addresses.
#
l
e
a
r
n
t
o
r
i
s
e
Swipe
www.infosectrain.com
5. Implement Detection
โ€ข IOA: Implement detection rules and alerts in
security tools such as SIEM, IDS, and EDR.
โ€ข IOC: Integrate IOC signatures into security
appliances, ๏ฌrewalls, and endpoint protection
platforms.
6. Test and Validate
โ€ข IOA & IOC: Test the indicators against
historical data and simulated attack
scenarios to validate their effectiveness.
7. Re๏ฌne and Update:
โ€ข IOA & IOC: Continuously re๏ฌne and update
indicators based on evolving threats and
false positive/negative feedback.
#
l
e
a
r
n
t
o
r
i
s
e
Swipe
www.infosectrain.com
8. Automate and Integrate:
โ€ข IOA & IOC: Automate the process of gathering
and analyzing threat intelligence. Integrate
IOA and IOC with incident response and threat
hunting work๏ฌ‚ows.
9. Share and Collaborate:
โ€ข IOA & IOC: Share indicators with trusted
partners, ISACs (Information Sharing and
Analysis Centers), and threat intelligence
communities.
10. Educate and Train:
โ€ข IOA & IOC: Educate and train security teams
on the latest threats and indicators. Conduct
regular drills and exercises to enhance
detection and response capabilities.
#
l
e
a
r
n
t
o
r
i
s
e
Swipe
www.infosectrain.com
To Get More Insights Through Our FREE
FOUND THIS USEFUL?
Courses | Workshops | eBooks | Checklists | Mock Tests
LIKE FOLLOW
SHARE

More Related Content

Similar to International Olympic Association and the International Olympic Committee

Using indicators to deal with security attacks
Using indicators to deal with security attacksUsing indicators to deal with security attacks
Using indicators to deal with security attacksZoho Corporation
ย 
How-To Find Malicious Backdoors and Business Logic Vulnerabilities in Your Code
How-To Find Malicious Backdoors and Business Logic Vulnerabilities in Your CodeHow-To Find Malicious Backdoors and Business Logic Vulnerabilities in Your Code
How-To Find Malicious Backdoors and Business Logic Vulnerabilities in Your CodeDevOps.com
ย 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing Priyanka Aash
ย 
Common Web Application Attacks
Common Web Application Attacks Common Web Application Attacks
Common Web Application Attacks Ahmed Sherif
ย 
Why 'positive security' is a software security game changer
Why 'positive security' is a software security game changerWhy 'positive security' is a software security game changer
Why 'positive security' is a software security game changerJaap Karan Singh
ย 
Your internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerableYour internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerableIIMBNSRCEL
ย 
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...apidays
ย 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0Q Fadlan
ย 
Create code confidence for better application security
Create code confidence for better application securityCreate code confidence for better application security
Create code confidence for better application securityRogue Wave Software
ย 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultAlienVault
ย 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
ย 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51martinvoelk
ย 
Secure coding guidelines
Secure coding guidelinesSecure coding guidelines
Secure coding guidelinesZakaria SMAHI
ย 
iOS Application Security.pdf
iOS Application Security.pdfiOS Application Security.pdf
iOS Application Security.pdfRavi Aggarwal
ย 
Understanding and Mitigating Common Security Risks in API Testing.pdf
Understanding and Mitigating Common Security Risks in API Testing.pdfUnderstanding and Mitigating Common Security Risks in API Testing.pdf
Understanding and Mitigating Common Security Risks in API Testing.pdfAmeliaJonas2
ย 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxAmardeepKumar621436
ย 
PatrOwl - Security Operations Orchestration
PatrOwl  - Security Operations OrchestrationPatrOwl  - Security Operations Orchestration
PatrOwl - Security Operations OrchestrationMaKyOtOx
ย 
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...apidays
ย 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security TestingTEST Huddle
ย 

Similar to International Olympic Association and the International Olympic Committee (20)

Using indicators to deal with security attacks
Using indicators to deal with security attacksUsing indicators to deal with security attacks
Using indicators to deal with security attacks
ย 
How-To Find Malicious Backdoors and Business Logic Vulnerabilities in Your Code
How-To Find Malicious Backdoors and Business Logic Vulnerabilities in Your CodeHow-To Find Malicious Backdoors and Business Logic Vulnerabilities in Your Code
How-To Find Malicious Backdoors and Business Logic Vulnerabilities in Your Code
ย 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
ย 
Common Web Application Attacks
Common Web Application Attacks Common Web Application Attacks
Common Web Application Attacks
ย 
Why 'positive security' is a software security game changer
Why 'positive security' is a software security game changerWhy 'positive security' is a software security game changer
Why 'positive security' is a software security game changer
ย 
Your internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerableYour internet-exposure-that-makes-you-vulnerable
Your internet-exposure-that-makes-you-vulnerable
ย 
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...
ย 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
ย 
Create code confidence for better application security
Create code confidence for better application securityCreate code confidence for better application security
Create code confidence for better application security
ย 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
ย 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
ย 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
ย 
Secure coding guidelines
Secure coding guidelinesSecure coding guidelines
Secure coding guidelines
ย 
iOS Application Security.pdf
iOS Application Security.pdfiOS Application Security.pdf
iOS Application Security.pdf
ย 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
ย 
Understanding and Mitigating Common Security Risks in API Testing.pdf
Understanding and Mitigating Common Security Risks in API Testing.pdfUnderstanding and Mitigating Common Security Risks in API Testing.pdf
Understanding and Mitigating Common Security Risks in API Testing.pdf
ย 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
ย 
PatrOwl - Security Operations Orchestration
PatrOwl  - Security Operations OrchestrationPatrOwl  - Security Operations Orchestration
PatrOwl - Security Operations Orchestration
ย 
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
ย 
Zen and the art of Security Testing
Zen and the art of Security TestingZen and the art of Security Testing
Zen and the art of Security Testing
ย 

More from Infosec train

Threat_Intelligence_vs_Threat_Assessment_vs_Threat_Modeling_1.pdf
Threat_Intelligence_vs_Threat_Assessment_vs_Threat_Modeling_1.pdfThreat_Intelligence_vs_Threat_Assessment_vs_Threat_Modeling_1.pdf
Threat_Intelligence_vs_Threat_Assessment_vs_Threat_Modeling_1.pdfInfosec train
ย 
Threat hunting is a proactive cybersecurity strategy
Threat hunting is a proactive cybersecurity strategyThreat hunting is a proactive cybersecurity strategy
Threat hunting is a proactive cybersecurity strategyInfosec train
ย 
A Trojan virus is a type of malware that disguises itself as a legitimate fil...
A Trojan virus is a type of malware that disguises itself as a legitimate fil...A Trojan virus is a type of malware that disguises itself as a legitimate fil...
A Trojan virus is a type of malware that disguises itself as a legitimate fil...Infosec train
ย 
"Viruses at Bay" depicts a powerful scene of defense against unseen threats.
"Viruses at Bay" depicts a powerful scene of defense against unseen threats."Viruses at Bay" depicts a powerful scene of defense against unseen threats.
"Viruses at Bay" depicts a powerful scene of defense against unseen threats.Infosec train
ย 
Cybersecurity Resolutions 2024.pdfffffff
Cybersecurity Resolutions 2024.pdfffffffCybersecurity Resolutions 2024.pdfffffff
Cybersecurity Resolutions 2024.pdfffffffInfosec train
ย 
๐ƒ๐š๐ญ๐š ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง ๐Ž๐Ÿ๐Ÿ๐ข๐œ๐ž๐ซ (๐ƒ๐๐Ž) ๐Ž๐ง๐ฅ๐ข๐ง๐ž ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ " !
๐ƒ๐š๐ญ๐š ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง ๐Ž๐Ÿ๐Ÿ๐ข๐œ๐ž๐ซ (๐ƒ๐๐Ž) ๐Ž๐ง๐ฅ๐ข๐ง๐ž ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ " !๐ƒ๐š๐ญ๐š ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง ๐Ž๐Ÿ๐Ÿ๐ข๐œ๐ž๐ซ (๐ƒ๐๐Ž) ๐Ž๐ง๐ฅ๐ข๐ง๐ž ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ " !
๐ƒ๐š๐ญ๐š ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง ๐Ž๐Ÿ๐Ÿ๐ข๐œ๐ž๐ซ (๐ƒ๐๐Ž) ๐Ž๐ง๐ฅ๐ข๐ง๐ž ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ " !Infosec train
ย 
Join us this May for a series of FREEevents
Join us this May for a series of FREEeventsJoin us this May for a series of FREEevents
Join us this May for a series of FREEeventsInfosec train
ย 
๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ
๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ
๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญInfosec train
ย 
๐ƒ๐š๐ญ๐š ๐ƒ๐ž๐Ÿ๐ž๐ง๐ฌ๐ž ๐’๐ช๐ฎ๐š๐: ๐“๐จ๐จ๐ฅ๐ฌ ๐Ÿ๐จ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ
๐ƒ๐š๐ญ๐š ๐ƒ๐ž๐Ÿ๐ž๐ง๐ฌ๐ž ๐’๐ช๐ฎ๐š๐: ๐“๐จ๐จ๐ฅ๐ฌ ๐Ÿ๐จ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ๐ƒ๐š๐ญ๐š ๐ƒ๐ž๐Ÿ๐ž๐ง๐ฌ๐ž ๐’๐ช๐ฎ๐š๐: ๐“๐จ๐จ๐ฅ๐ฌ ๐Ÿ๐จ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ
๐ƒ๐š๐ญ๐š ๐ƒ๐ž๐Ÿ๐ž๐ง๐ฌ๐ž ๐’๐ช๐ฎ๐š๐: ๐“๐จ๐จ๐ฅ๐ฌ ๐Ÿ๐จ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒInfosec train
ย 
๐‚๐ˆ๐๐“ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ !
๐‚๐ˆ๐๐“ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ !๐‚๐ˆ๐๐“ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ !
๐‚๐ˆ๐๐“ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ !Infosec train
ย 
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐žInfosec train
ย 
๐”๐ง๐ฏ๐ž๐ข๐ฅ๐ข๐ง๐  ๐€๐๐“๐Ÿ๐Ÿ—: ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
๐”๐ง๐ฏ๐ž๐ข๐ฅ๐ข๐ง๐  ๐€๐๐“๐Ÿ๐Ÿ—: ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š๐”๐ง๐ฏ๐ž๐ข๐ฅ๐ข๐ง๐  ๐€๐๐“๐Ÿ๐Ÿ—: ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
๐”๐ง๐ฏ๐ž๐ข๐ฅ๐ข๐ง๐  ๐€๐๐“๐Ÿ๐Ÿ—: ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐šInfosec train
ย 
Threat Hunting Threat hunting is a proactive approach to cybersecurity Techni...
Threat Hunting Threat hunting is a proactive approach to cybersecurity Techni...Threat Hunting Threat hunting is a proactive approach to cybersecurity Techni...
Threat Hunting Threat hunting is a proactive approach to cybersecurity Techni...Infosec train
ย 
TOP 10 sneakier cyber attacks in 2024. pdf
TOP 10 sneakier cyber attacks in 2024. pdfTOP 10 sneakier cyber attacks in 2024. pdf
TOP 10 sneakier cyber attacks in 2024. pdfInfosec train
ย 
The Cyber Villains & cybercriminals .pdf
The Cyber Villains & cybercriminals .pdfThe Cyber Villains & cybercriminals .pdf
The Cyber Villains & cybercriminals .pdfInfosec train
ย 
Penetration Testing vs Vulnerability Assessment.pdf
Penetration Testing vs Vulnerability Assessment.pdfPenetration Testing vs Vulnerability Assessment.pdf
Penetration Testing vs Vulnerability Assessment.pdfInfosec train
ย 
Indiaโ€™s Digital Personal Data Protection Bill-New.pdf
Indiaโ€™s Digital Personal Data Protection Bill-New.pdfIndiaโ€™s Digital Personal Data Protection Bill-New.pdf
Indiaโ€™s Digital Personal Data Protection Bill-New.pdfInfosec train
ย 
Exploring-Biometrics-Security-&-Privacy-Concerns.pdf
Exploring-Biometrics-Security-&-Privacy-Concerns.pdfExploring-Biometrics-Security-&-Privacy-Concerns.pdf
Exploring-Biometrics-Security-&-Privacy-Concerns.pdfInfosec train
ย 
Data Privacy Assessment Checklist.pdf...
Data Privacy Assessment Checklist.pdf...Data Privacy Assessment Checklist.pdf...
Data Privacy Assessment Checklist.pdf...Infosec train
ย 
Challenge Handshake Authentication Protocol vs. Password Authentication Proto...
Challenge Handshake Authentication Protocol vs. Password Authentication Proto...Challenge Handshake Authentication Protocol vs. Password Authentication Proto...
Challenge Handshake Authentication Protocol vs. Password Authentication Proto...Infosec train
ย 

More from Infosec train (20)

Threat_Intelligence_vs_Threat_Assessment_vs_Threat_Modeling_1.pdf
Threat_Intelligence_vs_Threat_Assessment_vs_Threat_Modeling_1.pdfThreat_Intelligence_vs_Threat_Assessment_vs_Threat_Modeling_1.pdf
Threat_Intelligence_vs_Threat_Assessment_vs_Threat_Modeling_1.pdf
ย 
Threat hunting is a proactive cybersecurity strategy
Threat hunting is a proactive cybersecurity strategyThreat hunting is a proactive cybersecurity strategy
Threat hunting is a proactive cybersecurity strategy
ย 
A Trojan virus is a type of malware that disguises itself as a legitimate fil...
A Trojan virus is a type of malware that disguises itself as a legitimate fil...A Trojan virus is a type of malware that disguises itself as a legitimate fil...
A Trojan virus is a type of malware that disguises itself as a legitimate fil...
ย 
"Viruses at Bay" depicts a powerful scene of defense against unseen threats.
"Viruses at Bay" depicts a powerful scene of defense against unseen threats."Viruses at Bay" depicts a powerful scene of defense against unseen threats.
"Viruses at Bay" depicts a powerful scene of defense against unseen threats.
ย 
Cybersecurity Resolutions 2024.pdfffffff
Cybersecurity Resolutions 2024.pdfffffffCybersecurity Resolutions 2024.pdfffffff
Cybersecurity Resolutions 2024.pdfffffff
ย 
๐ƒ๐š๐ญ๐š ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง ๐Ž๐Ÿ๐Ÿ๐ข๐œ๐ž๐ซ (๐ƒ๐๐Ž) ๐Ž๐ง๐ฅ๐ข๐ง๐ž ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ " !
๐ƒ๐š๐ญ๐š ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง ๐Ž๐Ÿ๐Ÿ๐ข๐œ๐ž๐ซ (๐ƒ๐๐Ž) ๐Ž๐ง๐ฅ๐ข๐ง๐ž ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ " !๐ƒ๐š๐ญ๐š ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง ๐Ž๐Ÿ๐Ÿ๐ข๐œ๐ž๐ซ (๐ƒ๐๐Ž) ๐Ž๐ง๐ฅ๐ข๐ง๐ž ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ " !
๐ƒ๐š๐ญ๐š ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง ๐Ž๐Ÿ๐Ÿ๐ข๐œ๐ž๐ซ (๐ƒ๐๐Ž) ๐Ž๐ง๐ฅ๐ข๐ง๐ž ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ " !
ย 
Join us this May for a series of FREEevents
Join us this May for a series of FREEeventsJoin us this May for a series of FREEevents
Join us this May for a series of FREEevents
ย 
๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ
๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ
๐‚๐ˆ๐’๐’๐ ๐ƒ๐จ๐ฆ๐š๐ข๐ง ๐Ÿ: ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐‘๐ข๐ฌ๐ค ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ
ย 
๐ƒ๐š๐ญ๐š ๐ƒ๐ž๐Ÿ๐ž๐ง๐ฌ๐ž ๐’๐ช๐ฎ๐š๐: ๐“๐จ๐จ๐ฅ๐ฌ ๐Ÿ๐จ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ
๐ƒ๐š๐ญ๐š ๐ƒ๐ž๐Ÿ๐ž๐ง๐ฌ๐ž ๐’๐ช๐ฎ๐š๐: ๐“๐จ๐จ๐ฅ๐ฌ ๐Ÿ๐จ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ๐ƒ๐š๐ญ๐š ๐ƒ๐ž๐Ÿ๐ž๐ง๐ฌ๐ž ๐’๐ช๐ฎ๐š๐: ๐“๐จ๐จ๐ฅ๐ฌ ๐Ÿ๐จ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ
๐ƒ๐š๐ญ๐š ๐ƒ๐ž๐Ÿ๐ž๐ง๐ฌ๐ž ๐’๐ช๐ฎ๐š๐: ๐“๐จ๐จ๐ฅ๐ฌ ๐Ÿ๐จ๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ
ย 
๐‚๐ˆ๐๐“ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ !
๐‚๐ˆ๐๐“ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ !๐‚๐ˆ๐๐“ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ !
๐‚๐ˆ๐๐“ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ !
ย 
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
ย 
๐”๐ง๐ฏ๐ž๐ข๐ฅ๐ข๐ง๐  ๐€๐๐“๐Ÿ๐Ÿ—: ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
๐”๐ง๐ฏ๐ž๐ข๐ฅ๐ข๐ง๐  ๐€๐๐“๐Ÿ๐Ÿ—: ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š๐”๐ง๐ฏ๐ž๐ข๐ฅ๐ข๐ง๐  ๐€๐๐“๐Ÿ๐Ÿ—: ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
๐”๐ง๐ฏ๐ž๐ข๐ฅ๐ข๐ง๐  ๐€๐๐“๐Ÿ๐Ÿ—: ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
ย 
Threat Hunting Threat hunting is a proactive approach to cybersecurity Techni...
Threat Hunting Threat hunting is a proactive approach to cybersecurity Techni...Threat Hunting Threat hunting is a proactive approach to cybersecurity Techni...
Threat Hunting Threat hunting is a proactive approach to cybersecurity Techni...
ย 
TOP 10 sneakier cyber attacks in 2024. pdf
TOP 10 sneakier cyber attacks in 2024. pdfTOP 10 sneakier cyber attacks in 2024. pdf
TOP 10 sneakier cyber attacks in 2024. pdf
ย 
The Cyber Villains & cybercriminals .pdf
The Cyber Villains & cybercriminals .pdfThe Cyber Villains & cybercriminals .pdf
The Cyber Villains & cybercriminals .pdf
ย 
Penetration Testing vs Vulnerability Assessment.pdf
Penetration Testing vs Vulnerability Assessment.pdfPenetration Testing vs Vulnerability Assessment.pdf
Penetration Testing vs Vulnerability Assessment.pdf
ย 
Indiaโ€™s Digital Personal Data Protection Bill-New.pdf
Indiaโ€™s Digital Personal Data Protection Bill-New.pdfIndiaโ€™s Digital Personal Data Protection Bill-New.pdf
Indiaโ€™s Digital Personal Data Protection Bill-New.pdf
ย 
Exploring-Biometrics-Security-&-Privacy-Concerns.pdf
Exploring-Biometrics-Security-&-Privacy-Concerns.pdfExploring-Biometrics-Security-&-Privacy-Concerns.pdf
Exploring-Biometrics-Security-&-Privacy-Concerns.pdf
ย 
Data Privacy Assessment Checklist.pdf...
Data Privacy Assessment Checklist.pdf...Data Privacy Assessment Checklist.pdf...
Data Privacy Assessment Checklist.pdf...
ย 
Challenge Handshake Authentication Protocol vs. Password Authentication Proto...
Challenge Handshake Authentication Protocol vs. Password Authentication Proto...Challenge Handshake Authentication Protocol vs. Password Authentication Proto...
Challenge Handshake Authentication Protocol vs. Password Authentication Proto...
ย 

Recently uploaded

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
ย 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
ย 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
ย 
Tแป”NG ร”N TแบฌP THI Vร€O LแปšP 10 Mร”N TIแบพNG ANH Nฤ‚M HแปŒC 2023 - 2024 Cร“ ฤรP รN (NGแปฎ ร‚...
Tแป”NG ร”N TแบฌP THI Vร€O LแปšP 10 Mร”N TIแบพNG ANH Nฤ‚M HแปŒC 2023 - 2024 Cร“ ฤรP รN (NGแปฎ ร‚...Tแป”NG ร”N TแบฌP THI Vร€O LแปšP 10 Mร”N TIแบพNG ANH Nฤ‚M HแปŒC 2023 - 2024 Cร“ ฤรP รN (NGแปฎ ร‚...
Tแป”NG ร”N TแบฌP THI Vร€O LแปšP 10 Mร”N TIแบพNG ANH Nฤ‚M HแปŒC 2023 - 2024 Cร“ ฤรP รN (NGแปฎ ร‚...Nguyen Thanh Tu Collection
ย 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
ย 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
ย 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
ย 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
ย 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
ย 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
ย 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
ย 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
ย 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
ย 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
ย 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
ย 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
ย 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
ย 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
ย 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
ย 

Recently uploaded (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
ย 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
ย 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
ย 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ย 
Tแป”NG ร”N TแบฌP THI Vร€O LแปšP 10 Mร”N TIแบพNG ANH Nฤ‚M HแปŒC 2023 - 2024 Cร“ ฤรP รN (NGแปฎ ร‚...
Tแป”NG ร”N TแบฌP THI Vร€O LแปšP 10 Mร”N TIแบพNG ANH Nฤ‚M HแปŒC 2023 - 2024 Cร“ ฤรP รN (NGแปฎ ร‚...Tแป”NG ร”N TแบฌP THI Vร€O LแปšP 10 Mร”N TIแบพNG ANH Nฤ‚M HแปŒC 2023 - 2024 Cร“ ฤรP รN (NGแปฎ ร‚...
Tแป”NG ร”N TแบฌP THI Vร€O LแปšP 10 Mร”N TIแบพNG ANH Nฤ‚M HแปŒC 2023 - 2024 Cร“ ฤรP รN (NGแปฎ ร‚...
ย 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
ย 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
ย 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
ย 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
ย 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
ย 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
ย 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
ย 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
ย 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
ย 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
ย 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
ย 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
ย 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
ย 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
ย 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
ย 

International Olympic Association and the International Olympic Committee

  • 1. IOC INDICATOR OF COMPROMISE IOA INDICATOR OF ATTACK EVERYTHING ABOUT IOA VS IOC # l e a r n t o r i s e Swipe www.infosectrain.com
  • 2. IOA or Indicator of Attack, is a pattern of behavior that indicates that a cyber attack is in progress or is about to happen. IOAs are based on the knowledge of how attackers typically operate, and they can be used to detect a wide range of attacks. EXAMPLE โ€ข A sudden increase in the number of failed login attempts to a system. IOA # l e a r n t o r i s e Swipe www.infosectrain.com
  • 3. IOC or Indicator of Compromise, is a piece of evidence that indicates that a system has been compromised. IOCs can be anything from a speci๏ฌc IP address to a ๏ฌle hash to a registry entry. IOCs are often used to detect known threats, such as speci๏ฌc malware strains or attack vectors. EXAMPLE โ€ข The presence of a speci๏ฌc malware ๏ฌle on a system. IOC # l e a r n t o r i s e Swipe www.infosectrain.com
  • 4. 1. De๏ฌne Objectives โ€ข IOA: Identify the objectives for detecting mali cious activities before they compromise the system. โ€ข IOC: De๏ฌne the goals for identifying signs of a successful breach or compromise. 2. Gather Data โ€ข IOA: Collect data on attack tactics, techniques, and procedures (TTPs). โ€ข IOC: Gather logs, network traf๏ฌc data, and system events. HOW TO BUILD # l e a r n t o r i s e Swipe www.infosectrain.com
  • 5. 3. Analyze Threat Intelligence โ€ข IOA: Analyze threat intelligence feeds, reports, and forums for emerging threats and attack patterns. โ€ข IOC: Review threat intelligence for known signatures, malware hashes, malicious IPs, and domains. 4. Develop Indicators โ€ข IOA: Develop indicators based on observed attack behaviors, anomalies, and patterns. โ€ข IOC: Create indicators using known compromised elements such as ๏ฌle hashes, IP addresses, URLs, and email addresses. # l e a r n t o r i s e Swipe www.infosectrain.com
  • 6. 5. Implement Detection โ€ข IOA: Implement detection rules and alerts in security tools such as SIEM, IDS, and EDR. โ€ข IOC: Integrate IOC signatures into security appliances, ๏ฌrewalls, and endpoint protection platforms. 6. Test and Validate โ€ข IOA & IOC: Test the indicators against historical data and simulated attack scenarios to validate their effectiveness. 7. Re๏ฌne and Update: โ€ข IOA & IOC: Continuously re๏ฌne and update indicators based on evolving threats and false positive/negative feedback. # l e a r n t o r i s e Swipe www.infosectrain.com
  • 7. 8. Automate and Integrate: โ€ข IOA & IOC: Automate the process of gathering and analyzing threat intelligence. Integrate IOA and IOC with incident response and threat hunting work๏ฌ‚ows. 9. Share and Collaborate: โ€ข IOA & IOC: Share indicators with trusted partners, ISACs (Information Sharing and Analysis Centers), and threat intelligence communities. 10. Educate and Train: โ€ข IOA & IOC: Educate and train security teams on the latest threats and indicators. Conduct regular drills and exercises to enhance detection and response capabilities. # l e a r n t o r i s e Swipe www.infosectrain.com
  • 8. To Get More Insights Through Our FREE FOUND THIS USEFUL? Courses | Workshops | eBooks | Checklists | Mock Tests LIKE FOLLOW SHARE