当前位置:网站首页>How to organize an actual attack and defense drill
How to organize an actual attack and defense drill
2022-07-05 21:43:00 【InfoQ】
One 、 Organizational elements of actual attack and defense drill
- Organizational unitBe responsible for overall control 、 Resource coordination 、 Prepare for the drill 、 Drill organization 、 Drill summary 、 Implement rectification and other work .
- Technical support unitBy a professional safety company , Be responsible for providing corresponding technical support and guarantee , Conduct the establishment of attack and defense confrontation exercise environment and visual display of attack and defense exercise .
- Attack teamGenerally, it is independently established by multiple security manufacturers , Each attack team is generally equipped with 3~5 people . With authorization , Explore with assets 、 Tool scanning and manual infiltration are the main penetration attacks , To obtain the permissions and data of the drill target system .
- Defending TeamFrom the participating units 、 Personnel composition of safety manufacturers, etc , Mainly responsible for protecting the assets under the jurisdiction of the defense team , Try to prevent the blue team from getting permission and data .
Two 、 The organizational form of the actual attack and defense drill
- By state 、 Industry authorities 、 Drills organized by regulators. Such drills are generally conducted by public security organs at all levels 、 E-mail departments at all levels 、 The government 、 Finance 、 traffic 、 health 、 education 、 Electric power 、 Countries such as operators 、 Industry competent departments or regulatory agencies organize . For key industry information infrastructure and important systems , Organize attack teams and enterprises and institutions in the industry to conduct network actual attack and defense drills .
- Drills organized by large enterprises and institutions. Financial enterprises 、 Operator, 、 administrative organ 、 Public institutions and other government and enterprise units , Verification requirements for the effectiveness of business security defense system construction , Organize attack teams and enterprises and institutions to conduct actual attack and defense drills .
3、 ... and 、 The key to the organization of the actual attack and defense drill
- Scope of drill: Prioritize priorities ( Unclassified ) Key business systems and Networks .
- Drill cycle: Combine with actual business , General advice 1~2 Zhou .
- Drill site: Select the corresponding site according to the drill scale , Be able to accommodate organizational units 、 Attack team 、 Defending Team , And the three sites should be separated .
- Drill equipment: Build an attack and defense drill platform 、 Video monitoring system , Distribute special computers to the attackers ( Or provide virtual attack terminals ) etc. .
- The attack team was formed: Choose the self owned personnel of the participating units or hire professionals from a third-party security service provider to form .
- The defense team is formed: Mainly the self owned safety technicians of each participating unit , Assisted by professionals from third-party security service providers .
- Exercise rule making: Formulate attack rules clearly before the drill 、 Defense rules and scoring rules , It is reasonable to ensure the offensive and defensive process , Avoid unnecessary impact of attack process on business operation .
Four 、 Risk avoidance measures for actual attack and defense drills
- The drill limits the attack target system , Unlimited attack path
- Unless authorized , Denial of service attacks are not allowed in the drill
- Description of the attack method of web page tampering
- Practice forbidden attack methods
- Requirements for the attacker's Trojan horse
- Illegal attack blocking and notification
边栏推荐
猜你喜欢

Huawei game multimedia service calls the method of shielding the voice of the specified player, and the error code 3010 is returned

Zhang Lijun: penetrating uncertainty depends on four "invariants"

1.2 download and installation of the help software rstudio

阿里云有奖体验:用PolarDB-X搭建一个高可用系统

递归查询多级菜单数据

"Grain mall" -- Summary and induction

DBeaver同时执行多条insert into报错处理

PIP install beatifulsoup4 installation failed

Emotional analysis of wechat chat records on Valentine's day based on Text Mining

资深电感厂家告诉你电感什么情况会有噪音电感噪音是比较常见的一种电感故障情况,如果使用的电感出现了噪音大家也不用着急,只需要准确查找分析出什么何原因,其实还是有具体的方法来解决的。作为一家拥有18年品牌
随机推荐
R language learning notes
HDU 4391 Paint The Wall 段树(水
KingbaseES V8R3集群维护案例之---在线添加备库管理节点
ESP32
Learning notes of statistical learning methods -- Chapter 1 Introduction to statistical learning methods
one hundred and twenty-three thousand four hundred and fifty-six
Pointer parameter passing vs reference parameter passing vs value parameter passing
Longest swing sequence [greedy practice]
1.2 download and installation of the help software rstudio
大约SQL现场“这包括”与“包括在”字符串的写法
Gcc9.5 offline installation
An exception occurred in Huawei game multimedia calling the room switching method internal system error Reason:90000017
Golang (1) | from environmental preparation to quick start
poj 3237 Tree(树链拆分)
让开发效率提升的跨端方案
int GetMonth( ) const throw( );后面的throw( )什么意思?
Two ways to realize video recording based on avfoundation
张丽俊:穿透不确定性要靠四个“不变”
Opérations de lecture et d'écriture pour easyexcel
Drawing HSV color wheel with MATLAB