Logo Cybersecurity Strategies

Cybersecurity Strategies
Introduction:
What are cyber security teams?

Red Hat Team:
A red team plays the role of the attacker by trying to find vulnerabilities and break through cybersecurity defenses.

Blue Hat Team:
A blue team defends against attacks and responds to incidents when they occur.

Gray hat Team:
Gray hat hackers operate in the nebulous area in between - they're not malicious, but they're not always ethical either.

Black hat Hackers:
Black hat hackers are motivated by malicious intent.

Our Views:

       A Plan says "Here is the steps," while a strategy says, "Here are the best steps."

Internet - Information System Security Structure Hierarchy Diagram
Image #1- Internet - Information System Security Structure Hierarchy Diagram


Image #1 presents a rough draft of all possible structure for any running system. The image represents the possible tiers client-Internet-Business interfaces. This is how the clients would be able to access the business side using the internet.

All these Cybersecurity teams (red, blue, gray, black, ...) are working on improving an organization's security. Sadly, we have a totally different view. To us, these teams are doing a great job testing but not detecting. For example, Linux in 2020: has 27.8 million lines of code in the kernel, 1.3 million in systemd (system and service manager). The Linux kernel has around 27.8 million lines of code in its Git repository, up from 26.1 million a year ago, while systemd now has nearly 1.3 million lines of code, according to GitHub stats analyzed by Michael Larabel at Phoronix. Therefore, any serious application or system has tones of code for hackers to play with. Not to mention, development is not simple and development teams may not do the best job in testing their own software due to deadlines, integrations, remote interfaces, changes in specs and so on. Therefore:

1. Our first strategy:
is by looking at each level of the system structure as shown in Images #1.
We should understand each level and all possible holes and issues which hackers can exploit.

2. Our Second strategy:
is using automation and intelligence tools such as Machine Learning. As we stated in Linus code count example, the number of malicious code which can be hidden in these tools and applications is overwhelming. Hackers can have their code "Hidden in Plain Sight" in any application or updates. The SolarWinds case is the perfect example.

Our Strategies are using what we documented in this presentation:

       5 - CRM System for Security Holes, Vulnerabilities, Risks and Hackers' Tracks
       6 - Using Virtualization in Cybersecurity
       7 - DevOps and Cybersecurity
       8 - Machine Learning and Cybersecurity
       9 - CRM System for: Security and Hacking