Типовые сценарии атак и методы их обнаружения
Attack Type | Initial Vector | Key Indicators | Critical Controls | Severity |
---|---|---|---|---|
Ransomware | Phishing, RDP | Shadow copies deletion, encryption | Backups, EDR, Network segmentation | Critical |
APT | Spear phishing, 0-day | Long dwell time, custom tools | Threat hunting, NDR, UEBA | Critical |
Insider Threat | Legitimate access | Abnormal access patterns | DLP, UEBA, Access control | High |
Web Attacks | Public applications | SQLi, XSS patterns | WAF, Input validation, Patching | High |
BEC | Email compromise | Wire transfer requests | Email security, MFA, Training | Medium |
Cryptomining | Vulnerable services | High CPU usage | Patch management, EDR | Low |