<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Dzmitry Harbachou</title>
    <description>The latest articles on DEV Community by Dzmitry Harbachou (@dharbachou).</description>
    <link>https://dev.to/dharbachou</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2914153%2Faaa412e5-d814-4233-8c92-d5bd387a45b3.png</url>
      <title>DEV Community: Dzmitry Harbachou</title>
      <link>https://dev.to/dharbachou</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/dharbachou"/>
    <language>en</language>
    <item>
      <title>Cybersecurity tools: SIEM or are companies really spying on us</title>
      <dc:creator>Dzmitry Harbachou</dc:creator>
      <pubDate>Mon, 15 Dec 2025 17:28:30 +0000</pubDate>
      <link>https://dev.to/dharbachou/cybersecurity-tools-siem-or-are-companies-really-spying-on-us-med</link>
      <guid>https://dev.to/dharbachou/cybersecurity-tools-siem-or-are-companies-really-spying-on-us-med</guid>
      <description>&lt;p&gt;The idea for this article came about a year ago, maybe even a little earlier, when a message appeared in our corporate inbox informing us that we needed to install a new tool, and that tool was SIEM.&lt;/p&gt;

&lt;p&gt;That email instantly triggered a new wave of discussions about SIEM, and a new question quickly emerged in our conversations: &lt;strong&gt;“Is the company really trying to spy on us?”&lt;/strong&gt;. This reaction wasn’t surprising, because the unknown has a way of amplifying doubts and fueling speculation. It has been this way throughout history: ancient people attributed lightning and storms to mystical forces or divine anger simply because they had no better explanation. And now, in a regular corporate setting, a new tool can trigger that same reaction, a mix of curiosity and unease, long before anyone understands what it actually does.&lt;/p&gt;

&lt;p&gt;And now it’s time to clear up the concerns and take a closer look at what SIEM actually is.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is SIEM?
&lt;/h2&gt;

&lt;p&gt;So, before we dive into the technical details, what this tool actually collects and analyzes, we need to understand what it is in the first place.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;SIEM&lt;/strong&gt;, or &lt;strong&gt;Security Information and Event Management&lt;/strong&gt;, is an application that collects and analyzes log data to monitor critical activities in an organization. SIEM tools offer real-time monitoring and tracking of security event logs. The data is then used to conduct a thorough analysis of any potential security threat, risk, or vulnerability identified. SIEM tools have many dashboard options, each dashboard option helps cybersecurity specialists manage and monitor organizational data. &lt;em&gt;So, in simple terms, SIEM acts as a central hub where security-related events from different systems are collected, processed, and analyzed.&lt;/em&gt; However, currently, SIEM tools require human interaction for analysis of security events.  &lt;/p&gt;

&lt;h2&gt;
  
  
  What SIEM Actually Does
&lt;/h2&gt;

&lt;p&gt;Alright, that all sounded nice, but it still doesn’t answer the main question: &lt;strong&gt;&lt;em&gt;what does SIEM actually do?&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Let’s break it down. At a high level, SIEM does four things:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Collects events&lt;/li&gt;
&lt;li&gt;Normalizes and organizes data&lt;/li&gt;
&lt;li&gt;Detects suspicious or harmful activity&lt;/li&gt;
&lt;li&gt;Alerts security teams and helps investigate incidents&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Now let’s take a closer look at each part.&lt;/p&gt;

&lt;h3&gt;
  
  
  SIEM Collects Events
&lt;/h3&gt;

&lt;p&gt;Every system in an organization generates logs: servers, laptops, applications, firewalls, authentication services, cloud platforms - all.&lt;/p&gt;

&lt;p&gt;SIEM acts as a central collector. It gathers:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;login attempts,&lt;/li&gt;
&lt;li&gt;system changes,&lt;/li&gt;
&lt;li&gt;network activity,&lt;/li&gt;
&lt;li&gt;application behavior,&lt;/li&gt;
&lt;li&gt;security alerts from other tools.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These signals are useless in isolation, but together they give context.&lt;/p&gt;

&lt;h3&gt;
  
  
  SIEM Normalizes and Organizes the Data
&lt;/h3&gt;

&lt;p&gt;Each system logs events differently. One says “authentication failed,” another reports a “login error,” and a third system might only record an error code - all referring to the exact same thing. SIEM translates this chaos into a unified format so analysts (and automated rules) can actually work with it.&lt;/p&gt;

&lt;h3&gt;
  
  
  SIEM Detects Suspicious Activity
&lt;/h3&gt;

&lt;p&gt;Here’s where SIEM earns its place in cybersecurity.&lt;/p&gt;

&lt;p&gt;It correlates different events and looks for patterns such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;too many failed logins in a short time,&lt;/li&gt;
&lt;li&gt;access from an unusual location,&lt;/li&gt;
&lt;li&gt;abnormal data transfers,&lt;/li&gt;
&lt;li&gt;unexpected privilege escalations,&lt;/li&gt;
&lt;li&gt;behavior deviation from the user’s normal pattern.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;One event means nothing, but a chain of events can mean an attack.&lt;/p&gt;

&lt;h3&gt;
  
  
  SIEM Alerts and Supports Investigations
&lt;/h3&gt;

&lt;p&gt;When SIEM detects something suspicious, it generates an alert:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;for the security team (SOC),&lt;/li&gt;
&lt;li&gt;for automated response systems,&lt;/li&gt;
&lt;li&gt;or for further analysis.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And if an incident actually happens, SIEM becomes the main tool for reconstructing what occurred: who did what, when, from where, and how.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;- &lt;strong&gt;Hold on, hold on!&lt;/strong&gt; Didn’t you just say that employees were asked to install SIEM on their laptops? Based on what you’ve described so far, it might sound like the employees themselves would be doing the monitoring and analysis.&lt;/p&gt;

&lt;p&gt;- So let’s clear that up. What we were actually asked to install wasn’t SIEM itself, but a SIEM agent - a small program that sends the necessary logs from employee devices to the central SIEM system. That’s it. The agent doesn’t analyze anything on its own; it simply collects relevant security events and forwards them for monitoring, correlation, and vulnerability detection.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Types of SIEM by Purpose
&lt;/h2&gt;

&lt;p&gt;Although SIEM as a class solves the same core problem of collecting, correlating and analyzing security events, different systems vary in their focus, architecture and intended use cases. SIEM solutions are generally divided into the following categories:&lt;/p&gt;

&lt;h3&gt;
  
  
  Traditional SIEM
&lt;/h3&gt;

&lt;p&gt;Early generations of SIEM systems focused primarily on log collection, static correlation based on rules, and meeting compliance requirements. The foundation is manual correlation rules and log search.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Focus:&lt;/strong&gt; Logging, basic correlation, auditing, compliance.&lt;br&gt;
&lt;strong&gt;Key features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;rule-based analysis&lt;/li&gt;
&lt;li&gt;minimal automation&lt;/li&gt;
&lt;li&gt;limited behavioral analytics&lt;/li&gt;
&lt;li&gt;weak cloud support&lt;/li&gt;
&lt;li&gt;simple architecture but high alert noise
&lt;strong&gt;Examples:&lt;/strong&gt; MicroFocus ArcSight, older versions of QRadar, LogRhythm Classic&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Next-Gen SIEM
&lt;/h3&gt;

&lt;p&gt;Modern SIEM systems that include machine learning, UEBA, automation, and advanced correlation capabilities. Widely used as part of a full SOC ecosystem.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Focus:&lt;/strong&gt; Advanced analytics, automated response, enhanced correlation.&lt;br&gt;
&lt;strong&gt;Key features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;UEBA (user and entity behavior analytics)&lt;/li&gt;
&lt;li&gt;ML-based anomaly detection&lt;/li&gt;
&lt;li&gt;tight integration with SOAR&lt;/li&gt;
&lt;li&gt;hybrid support (on-prem and cloud)&lt;/li&gt;
&lt;li&gt;improved threat intelligence context
&lt;strong&gt;Examples:&lt;/strong&gt; Splunk Enterprise Security, IBM QRadar (newer versions), Exabeam&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Cloud-Native SIEM
&lt;/h3&gt;

&lt;p&gt;SIEM systems built to run entirely in the cloud. They offer scalability, speed, and no need to maintain infrastructure. Often support large or nearly unlimited data retention.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Focus:&lt;/strong&gt; SaaS architecture, high scalability, cloud integrations.&lt;br&gt;
&lt;strong&gt;Key features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;automatic resource management&lt;/li&gt;
&lt;li&gt;ability to process very large log volumes&lt;/li&gt;
&lt;li&gt;seamless integration with cloud platforms (AWS, Azure, GCP)&lt;/li&gt;
&lt;li&gt;fast correlation and search&lt;/li&gt;
&lt;li&gt;pay-as-you-go pricing model
&lt;strong&gt;Examples:&lt;/strong&gt; Microsoft Sentinel, Google Chronicle, Sumo Logic Cloud SIEM&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Managed SIEM (for MSSP / Managed SOC)
&lt;/h3&gt;

&lt;p&gt;SIEM solutions designed for service providers who monitor and respond to incidents on behalf of multiple customers. Built with multi-tenancy and SLA-driven workflows in mind.&lt;br&gt;
&lt;strong&gt;Focus:&lt;/strong&gt; Security monitoring as a service, MSSP-friendly features.&lt;br&gt;
&lt;strong&gt;Key features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;multi-tenant architecture&lt;/li&gt;
&lt;li&gt;centralized customer management&lt;/li&gt;
&lt;li&gt;automated response capabilities&lt;/li&gt;
&lt;li&gt;reduced operational load for customers&lt;/li&gt;
&lt;li&gt;preconfigured rules and playbooks
&lt;strong&gt;Examples:&lt;/strong&gt; AT&amp;amp;T USM (AlienVault), LogRhythm, Blumira&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Open-Source SIEM
&lt;/h3&gt;

&lt;p&gt;Systems built on open-source technologies that often require substantial customization. Popular with smaller teams, labs, and technical groups that want flexibility and control.&lt;br&gt;
&lt;strong&gt;Focus:&lt;/strong&gt; Flexibility, accessibility, customization without licensing fees. &lt;br&gt;
&lt;strong&gt;Key features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;free or open-core model&lt;/li&gt;
&lt;li&gt;requires significant configuration&lt;/li&gt;
&lt;li&gt;suitable for DevOps and SecOps experimentation&lt;/li&gt;
&lt;li&gt;strong community support&lt;/li&gt;
&lt;li&gt;flexible but not always enterprise-grade
&lt;strong&gt;Examples:&lt;/strong&gt; Wazuh, Elastic SIEM (partially open-core), OSSIM&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  A little more... (TOP 5 SIEM tools)
&lt;/h2&gt;

&lt;p&gt;We have covered the basics, so it is time to meet the SIEM tools you are most likely to encounter in the real world.&lt;/p&gt;

&lt;h3&gt;
  
  
  Splunk Enterprise Security
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;The luxury sports car of SIEM tools.&lt;/em&gt;&lt;br&gt;
Incredibly fast, extremely powerful and capable of almost anything… as long as your budget survives.&lt;br&gt;
If a company has massive log volumes and money to spare, Splunk fits perfectly.&lt;br&gt;
&lt;em&gt;&lt;strong&gt;In short: "I can do anything. Just pay me."&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;2) IBM QRadar&lt;/p&gt;

&lt;p&gt;The seasoned senior analyst who sees everything and forgets nothing.&lt;br&gt;
It does not need flashy interfaces. It simply gets the job done.&lt;br&gt;
Its event correlation capabilities outperform many newer SIEM products.&lt;br&gt;
&lt;em&gt;&lt;strong&gt;In short: "I know exactly what happened, and I have the flows to prove it."&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;3) Microsoft Sentinel&lt;/p&gt;

&lt;p&gt;The SIEM for anyone living in the Microsoft ecosystem.&lt;br&gt;
Easy to start with, cloud friendly and perfectly integrated with Microsoft tools.&lt;br&gt;
Modern, automated and scalable as your organization grows.&lt;br&gt;
&lt;em&gt;&lt;strong&gt;In short: "If it is in Azure, I have already integrated with it."&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;4) Google Chronicle&lt;/p&gt;

&lt;p&gt;The Big Data monster on steroids.&lt;br&gt;
It works incredibly fast and stores almost unlimited data without blinking.&lt;br&gt;
If you produce billions of events per day, Chronicle simply says: "So what?"&lt;br&gt;
&lt;em&gt;&lt;strong&gt;In short: "Oh, you have a lot of logs? Cute."&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;5) Elastic SIEM (Elastic Security)&lt;/p&gt;

&lt;p&gt;The DevOps favorite: flexible, affordable and endlessly customizable.&lt;br&gt;
It can do a lot if you know how to set it up. But it requires hands-on work, patience and sometimes late-night troubleshooting.&lt;br&gt;
Perfect for those who like tailoring tools to their exact needs.&lt;br&gt;
&lt;em&gt;&lt;strong&gt;In short: "I can be anything you want, but you will configure me yourself."&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Organizations Use SIEM
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdpn5oau33zxy4yw4v88n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdpn5oau33zxy4yw4v88n.png" alt="Companies rely on" width="800" height="1200"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Companies rely on SIEM for several key reasons:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Early detection of cyberattacks&lt;/strong&gt;
SIEM can catch signs of intrusions before serious damage occurs.&lt;/li&gt;
&lt;li&gt;Understanding what’s happening in the infrastructure
Without SIEM, logs are scattered and unmanageable.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Protecting sensitive data and accounts&lt;/strong&gt;
It identifies abnormal behavior that could indicate insider threats or compromised credentials.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Compliance with security and privacy regulations&lt;/strong&gt;
Many standards (GDPR, PCI DSS, ISO 27001, SOC2) require monitoring and log retention - SIEM does exactly that.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Efficient investigations and audits&lt;/strong&gt;
When something goes wrong, SIEM helps understand where, how, and why.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Final Thoughts: No, the Company Isn’t Spying on You
&lt;/h2&gt;

&lt;p&gt;So, no - the company is not reading our messages (at least not in mine, and definitely not through a SIEM tool), not tracking how many minutes we spend making coffee, and not secretly watching our screens to see what we’re doing. What the company is doing is making sure that no one else gets access to our corporate devices while we’re busy doing our jobs.&lt;/p&gt;

&lt;p&gt;In reality, SIEM is far less dramatic than many imagine. It doesn’t spy on employees; it protects the organization from suspicious activity, compromised accounts, and potentially serious incidents. It notices patterns that humans might miss, helps security teams react faster, and ensures that the tools we rely on every day stay safe and trustworthy.&lt;/p&gt;

&lt;p&gt;If anything, SIEM’s role is closer to that of a quiet, overworked night guard: it doesn’t care what you typed in Slack - it only cares if someone tries to log in as you from the other side of the world at 3 a.m.&lt;/p&gt;

&lt;p&gt;So the next time an email arrives asking you to install another &lt;em&gt;&lt;strong&gt;“mysterious security tool”&lt;/strong&gt;&lt;/em&gt; remember: it’s not about watching you - it’s about watching your back.&lt;/p&gt;

&lt;p&gt;Talk soon…&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>tooling</category>
      <category>beginners</category>
      <category>analytics</category>
    </item>
    <item>
      <title>Boring Cybersecurity Theory: Main disciplines (Time to select your own way)</title>
      <dc:creator>Dzmitry Harbachou</dc:creator>
      <pubDate>Thu, 21 Aug 2025 09:00:00 +0000</pubDate>
      <link>https://dev.to/dharbachou/boring-cybersecurity-theory-main-disciplines-time-to-select-your-own-way-4oph</link>
      <guid>https://dev.to/dharbachou/boring-cybersecurity-theory-main-disciplines-time-to-select-your-own-way-4oph</guid>
      <description>&lt;p&gt;I didn’t put this article at the start of your journey - in my opinion, it’s hard to choose where you’re going if you haven’t yet seen what the road looks like, what challenges lie ahead, or who you’ll be walking beside.&lt;/p&gt;

&lt;p&gt;Now that you’ve already explored some of the core ideas of cybersecurity ( &lt;em&gt;&lt;strong&gt;threats, frameworks, ethics, risk&lt;/strong&gt;&lt;/em&gt;) - it’s the perfect moment to step back and ask: &lt;br&gt;
   &lt;strong&gt;&lt;em&gt;What kind of security professional do I want to become?&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Welcome to Cybersecurity - A World of Many Roads
&lt;/h2&gt;

&lt;p&gt;When most people hear the word &lt;em&gt;&lt;strong&gt;"cybersecurity"&lt;/strong&gt;&lt;/em&gt;, they picture someone in a hoodie hammering away at a keyboard in a dark room. In reality, though, cybersecurity is much more than just hacking or stopping hackers. It’s a vast and constantly evolving field, made up of many disciplines - each with its own tools, challenges, and mindset.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Think of it like a city - there's construction, maintenance, policing, investigation, intelligence gathering, governance, and even education. Each of these areas has a role to play in keeping systems and people safe. And just like in a city, cybersecurity needs builders, thinkers, defenders, and strategists.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This article will help you understand the main domains in the cybersecurity world. You’ll see how they connect, what types of jobs exist in each one, and - more importantly - which direction might suit you.&lt;/p&gt;

&lt;p&gt;Whether you prefer digging through logs, breaking into systems (&lt;em&gt;&lt;strong&gt;legally&lt;/strong&gt;&lt;/em&gt;), writing secure code, or shaping security policy, there’s a path here for you. All you have to do is find it.&lt;/p&gt;

&lt;p&gt;Let’s begin with one of the most widely recognized models - the NIST NICE Framework.&lt;/p&gt;

&lt;h2&gt;
  
  
  Seven Core Disciplines (NIST NICE Framework)
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;Another framework? Yes - but hear me out. In cybersecurity, there’s pretty much a framework for everything: how to detect attacks, how to respond, how to manage risk… and yes - even how to structure careers.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;To help make sense of the many roles in cybersecurity, the U.S. National Institute of Standards and Technology (NIST) created the NICE Framework - a structured way to group security work into seven high-level categories. Each one represents a different part of the cybersecurity lifecycle, and within each are roles that suit different interests and skillsets.&lt;/p&gt;

&lt;p&gt;Let’s take a quick tour through each one - who works there, what they do, and why it might just be the right place for you.&lt;/p&gt;

&lt;p&gt;Here’s a quick tour of the seven:&lt;/p&gt;

&lt;h4&gt;
  
  
  1. Securely Provision
&lt;/h4&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Design and build secure systems from the ground up&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
If you love building systems, writing secure code, or designing cloud infrastructure - this is your zone. These roles focus on baking security in from the start.&lt;br&gt;
&lt;strong&gt;Roles:&lt;/strong&gt; Security Architect, Secure Software Developer, Cloud Security Engineer.&lt;/p&gt;

&lt;h4&gt;
  
  
  2. Operate &amp;amp; Maintain
&lt;/h4&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Keep everything running safely&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
You’re the one making sure systems stay up, stay patched, and stay protected. Quiet when things are working - very loud when they aren’t.&lt;br&gt;
&lt;strong&gt;Roles:&lt;/strong&gt; System Admin, Patch Lead, IAM Engineer.&lt;/p&gt;

&lt;h4&gt;
  
  
  3. Protect &amp;amp; Defend
&lt;/h4&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Detect and fight off threats&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
Welcome to the Blue Team. You’ll be monitoring, analyzing logs, blocking attacks, and leading incident response. If you like action and puzzles, this is your home turf.&lt;br&gt;
&lt;strong&gt;Roles:&lt;/strong&gt; SOC Analyst, Threat Hunter, Incident Responder.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Investigate
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Dig into breaches and trace the digital fingerprints&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
Ever wanted to be a cyber detective? These roles involve forensics, malware analysis, and figuring out what really happened - byte by byte.&lt;br&gt;
&lt;strong&gt;Roles:&lt;/strong&gt; Forensics Analyst, Malware Analyst, Reverse Engineer.&lt;/p&gt;

&lt;h4&gt;
  
  
  5. Collect &amp;amp; Operate
&lt;/h4&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Offensive security - the ethical attackers&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
Here you’ll find the Red Team. You break into systems to help others defend them. It’s creative, methodical, and definitely fun - if you like thinking like a hacker.&lt;br&gt;
&lt;strong&gt;Roles:&lt;/strong&gt; Penetration Tester, Red Team Operator, Exploit Researcher.&lt;/p&gt;

&lt;h4&gt;
  
  
  6. Analyze
&lt;/h4&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Turn chaos into clarity&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
Threat intelligence, OSINT, behavior analytics - this is the strategic side of security. If you enjoy spotting patterns, researching actors, or thinking globally, this one’s for you.&lt;br&gt;
&lt;strong&gt;Roles:&lt;/strong&gt; CTI Analyst, OSINT Investigator, Threat Modeler.&lt;/p&gt;

&lt;h4&gt;
  
  
  7. Oversight &amp;amp; Governance
&lt;/h4&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Keep the business side of security in order&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
From compliance and policy to risk management and privacy law, this is where cybersecurity meets law, ethics, and leadership.&lt;br&gt;
&lt;strong&gt;Roles:&lt;/strong&gt; Risk Analyst, GRC Officer, CISO, Privacy Engineer.&lt;/p&gt;




&lt;p&gt;Each of these disciplines has its own rhythm, mindset, and mission. No path is &lt;em&gt;&lt;strong&gt;“more cybersecurity”&lt;/strong&gt;&lt;/em&gt; than another. It’s all about where your strengths lie - and what kind of work energizes you.&lt;/p&gt;

&lt;p&gt;As in the hacking world, cybersecurity uses colors to classify not people, but teams, based on their methods and intentions.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Color Team Model: Cybersecurity in Full Spectrum
&lt;/h3&gt;

&lt;p&gt;If you’ve ever read about cybersecurity operations, Capture the Flag (CTF) events, or real-world attack simulations, you’ve probably come across terms like Red Team or Blue Team. This is known as the “color team model” - a popular way the cybersecurity community classifies roles based on their goals and tactics.&lt;/p&gt;

&lt;p&gt;It’s not an official framework like NIST, but it’s widely used because… well, it works - and it paints a pretty vivid picture of what each role does in real-world operations.&lt;/p&gt;

&lt;p&gt;Here’s a quick rundown:&lt;/p&gt;

&lt;h4&gt;
  
  
  🟥 Red Team - Attackers (Ethical Hackers)
&lt;/h4&gt;

&lt;p&gt;These are the offensive professionals. They simulate real-world adversaries to test defenses. Red teamers try to breach systems, escalate privileges, steal data — but they do it with permission.&lt;br&gt;
&lt;strong&gt;Goal&lt;/strong&gt;: Show how a real attack might happen before an actual attacker gets there.&lt;br&gt;
&lt;strong&gt;Typical roles&lt;/strong&gt;: Penetration Tester, Red Teamer, Exploit Researcher.&lt;/p&gt;

&lt;h4&gt;
  
  
  🟦 Blue Team - Defenders
&lt;/h4&gt;

&lt;p&gt;The Blue Team builds and maintains defensive mechanisms. They monitor systems, detect anomalies, respond to incidents, and make it as hard as possible for attackers to succeed.&lt;br&gt;
&lt;strong&gt;Goal&lt;/strong&gt;: Stop or slow down attackers and minimize damage.&lt;br&gt;
&lt;strong&gt;Typical roles&lt;/strong&gt;: SOC Analyst, Incident Responder, Threat Hunter, SIEM Engineer.&lt;/p&gt;

&lt;h4&gt;
  
  
  🟪 Purple Team - Bridge Between Red and Blue
&lt;/h4&gt;

&lt;p&gt;Purple teams don’t replace Red or Blue - they connect them. A Purple Teamer might help a Blue Team improve detection by analyzing Red Team techniques or facilitate joint exercises.&lt;br&gt;
&lt;strong&gt;Goal&lt;/strong&gt;: Share insights and improve defense through collaboration.&lt;br&gt;
&lt;strong&gt;Typical roles&lt;/strong&gt;: Detection Engineer, Purple Team Analyst, Adversary Emulation Lead.&lt;/p&gt;

&lt;h4&gt;
  
  
  🟩 Green Team - Builders and Coders
&lt;/h4&gt;

&lt;p&gt;Often overlooked, Green Teams work on secure software development. Their job is to build systems and code with security in mind from day one. Think DevSecOps, secure APIs, encryption, etc.&lt;br&gt;
&lt;strong&gt;Goal&lt;/strong&gt;: Bake security into the foundation, so it’s harder to break later.&lt;br&gt;
&lt;strong&gt;Typical roles&lt;/strong&gt;: DevSecOps Engineer, Secure Developer, Cloud Security Architect.&lt;/p&gt;

&lt;h4&gt;
  
  
  ⚪ White Team - Rules and Coordination
&lt;/h4&gt;

&lt;p&gt;White Teams act as referees in exercises like Red vs. Blue simulations. In real life, they handle governance, oversight, and policy, ensuring ethical boundaries are respected and standards are followed.&lt;br&gt;
&lt;strong&gt;Goal&lt;/strong&gt;: Coordinate and enforce fairness, legality, and scope.&lt;br&gt;
&lt;strong&gt;Typical roles&lt;/strong&gt;: Compliance Officer, GRC Lead, Security Awareness Coordinator.&lt;/p&gt;

&lt;h4&gt;
  
  
  🟨 Yellow / Gold Team - Leadership and Strategy
&lt;/h4&gt;

&lt;p&gt;This team focuses on high-level decisions, business alignment, and long-term planning. They're not in the trenches but set the direction and strategy.&lt;br&gt;
&lt;strong&gt;Goal&lt;/strong&gt;: Ensure cybersecurity supports business goals and complies with regulations.&lt;br&gt;
&lt;strong&gt;Typical roles&lt;/strong&gt;: CISO, Security Program Manager, Risk &amp;amp; Policy Advisor&lt;/p&gt;




&lt;p&gt;Each team represents a different aspect of cybersecurity - and while the colors may vary depending on context, the core idea is the same:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Cybersecurity isn’t a solo effort. It’s a team sport - and everyone plays a different role.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Connecting Frameworks and Colors
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;How NICE Roles Map to Red, Blue, and Everything In Between&lt;/strong&gt;&lt;br&gt;
Now that you’ve seen both the NIST NICE disciplines and the color team model, let’s bridge the two.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why?&lt;/strong&gt;&lt;br&gt;
Because while frameworks help define structure, real-world cybersecurity work rarely stays in clean categories. A Red Teamer might use skills from "Collect &amp;amp; Operate" but also dive into analysis. A Blue Teamer might patch systems (Operate &amp;amp; Maintain) while investigating an incident.&lt;/p&gt;

&lt;p&gt;Here’s a simplified view of how the NICE categories align with color team concepts:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;NICE Discipline&lt;/th&gt;
&lt;th&gt;Color Team Alignment&lt;/th&gt;
&lt;th&gt;Example Roles&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Securely Provision&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;🟩 Green / ⚪ White&lt;/td&gt;
&lt;td&gt;Secure Developer, Cloud Security Engineer, Architect&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Operate &amp;amp; Maintain&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;🟦 Blue / 🟩 Green&lt;/td&gt;
&lt;td&gt;Patch Lead, IAM Engineer, Automation Engineer&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Protect &amp;amp; Defend&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;🟦 Blue&lt;/td&gt;
&lt;td&gt;SOC Analyst, Threat Hunter, SIEM Engineer&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Investigate&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;🟦 Blue / 🟪 Purple&lt;/td&gt;
&lt;td&gt;Forensics Analyst, Malware Analyst, IR Specialist&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Collect &amp;amp; Operate&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;🟥 Red&lt;/td&gt;
&lt;td&gt;Red Team Operator, Exploit Researcher, Pentester&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Analyze&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;🟪 Purple / 🟨 Yellow&lt;/td&gt;
&lt;td&gt;CTI Analyst, Threat Modeler, OSINT Investigator&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Oversight &amp;amp; Governance&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;⚪ White / 🟨 Yellow&lt;/td&gt;
&lt;td&gt;GRC Analyst, Compliance Officer, CISO&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;blockquote&gt;
&lt;p&gt;Keep in mind: these lines blur in real-world environments. Your role may sit at the intersection of two or even three teams - and that’s completely normal.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  So where do YOU fit?
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Like building secure systems from scratch? → You’re likely Green or White aligned.&lt;/li&gt;
&lt;li&gt;Love breaking things to find flaws? → Red Team might be your jam.&lt;/li&gt;
&lt;li&gt;Prefer defending and investigating? → Blue and Purple are calling.&lt;/li&gt;
&lt;li&gt;Want to strategize, govern, or teach? → White and Yellow roles could suit you best.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There’s no wrong answer - but there is a right fit for your interests, mindset, and energy. The fun part is figuring it out.&lt;/p&gt;

&lt;h2&gt;
  
  
  Choosing Your Path: What Fits You Best?
&lt;/h2&gt;

&lt;p&gt;Now that you’ve explored the landscape, it’s time for the big question:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Where do you see yourself in this world of roles, colors, and responsibilities?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Don’t worry - you don’t need to have it all figured out today. But here are some ways to start narrowing it down.&lt;/p&gt;

&lt;h3&gt;
  
  
  Start with your instincts:
&lt;/h3&gt;

&lt;p&gt;Ask yourself:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Do I like &lt;strong&gt;building&lt;/strong&gt; things, or &lt;strong&gt;breaking&lt;/strong&gt; them?&lt;/li&gt;
&lt;li&gt;Do I prefer &lt;strong&gt;real-time action&lt;/strong&gt;, or &lt;strong&gt;quiet analysis&lt;/strong&gt;?&lt;/li&gt;
&lt;li&gt;Am I more comfortable with &lt;strong&gt;people and policy&lt;/strong&gt;, or with &lt;strong&gt;code and systems&lt;/strong&gt;?&lt;/li&gt;
&lt;li&gt;Do I enjoy &lt;strong&gt;watching patterns&lt;/strong&gt;, &lt;strong&gt;telling stories from data&lt;/strong&gt;, or &lt;strong&gt;writing procedures&lt;/strong&gt;?&lt;/li&gt;
&lt;li&gt;Do I want to be in the &lt;strong&gt;front lines&lt;/strong&gt;, or working &lt;strong&gt;behind the scenes&lt;/strong&gt;?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Your honest answers will already start pointing you toward a discipline (and maybe even a color team).&lt;/p&gt;




&lt;h3&gt;
  
  
  🛠️ Match your mindset to disciplines:
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;If you enjoy…&lt;/th&gt;
&lt;th&gt;Explore this area&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Creating, designing systems&lt;/td&gt;
&lt;td&gt;Securely Provision / Green Team&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Breaking systems ethically&lt;/td&gt;
&lt;td&gt;Collect &amp;amp; Operate / Red Team&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Watching logs, reacting fast&lt;/td&gt;
&lt;td&gt;Protect &amp;amp; Defend / Blue Team&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Solving cyber mysteries&lt;/td&gt;
&lt;td&gt;Investigate / Blue-Purple&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Reading signals, researching&lt;/td&gt;
&lt;td&gt;Analyze / Purple-Yellow&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Managing policies and people&lt;/td&gt;
&lt;td&gt;Oversight &amp;amp; Governance / White-Yellow&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Building secure apps &amp;amp; pipelines&lt;/td&gt;
&lt;td&gt;DevSecOps (crosses Green, Blue, and White)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h3&gt;
  
  
  Not sure yet? That’s fine.
&lt;/h3&gt;

&lt;p&gt;Here’s a secret most professionals won’t tell you:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Many cybersecurity careers are built by exploring first, specializing later.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Start with what excites you. Learn broadly. Play around. Watch CTFs, take a short course, read breach reports, or try OSINT on yourself. The field is wide - and there’s more than one way to get in.&lt;/p&gt;

&lt;p&gt;You don’t need to be a hacker or a genius to belong here. You just need curiosity and persistence. The rest will come.&lt;/p&gt;

&lt;h2&gt;
  
  
  Final Points
&lt;/h2&gt;

&lt;p&gt;Final Points - because this is, for now, the end. Not the end-end, of course - I’m sure there will be more articles in the future, though I can’t promise when. My hope is that what you’ve read here gives you enough structured and connected ideas to start building your own picture of cybersecurity.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Funny thing is&lt;/strong&gt;&lt;/em&gt;, this series wasn’t even meant to be a series. At first, it was just going to be one short article to help prepare for a workshop. But the more I wrote, the more I realized how much there was to say - and I didn’t want to just skim over it. One article turned into many, and here we are.&lt;/p&gt;

&lt;p&gt;I’ve probably given you more than enough to start thinking - and that’s the point. I wanted you to see just how wide and varied this field really is. It’s not just &lt;em&gt;&lt;strong&gt;“hacking”&lt;/strong&gt;&lt;/em&gt; or &lt;em&gt;&lt;strong&gt;“defending”&lt;/strong&gt;&lt;/em&gt;. It’s building, breaking, analyzing, guiding, fixing, and leading.&lt;/p&gt;

&lt;p&gt;Now the map is in front of you. &lt;em&gt;&lt;strong&gt;The next step?&lt;/strong&gt;&lt;/em&gt; Choose a direction. Build a plan. Start small - a course, a pet project, maybe an internship. Don’t worry about knowing everything; you’ll learn along the way.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Cybersecurity is a journey, and you’re already on it. It’s not a straight line - it twists, it turns, it surprises. And who knows? Maybe one day, somewhere along the way, our paths will cross.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>beginners</category>
      <category>roadmap</category>
    </item>
    <item>
      <title>Boring Cybersecurity Theory: Ethics (Make Your Choice)</title>
      <dc:creator>Dzmitry Harbachou</dc:creator>
      <pubDate>Wed, 20 Aug 2025 09:00:00 +0000</pubDate>
      <link>https://dev.to/dharbachou/boring-cybersecurity-theory-ethics-make-your-choice-4ic1</link>
      <guid>https://dev.to/dharbachou/boring-cybersecurity-theory-ethics-make-your-choice-4ic1</guid>
      <description>&lt;p&gt;Security ethics are guidelines for making appropriate decisions as a security professional. Being ethical requires that security professionals remain unbiased and maintain the security and confidentiality of private data. Having a strong sense of ethics can help you navigate your decisions as a cybersecurity professional so you’re able to mitigate threats posed by threat actors’ constantly evolving tactics and techniques. In this article, you'll explore essential ethical principles that will help you make informed, legal, and responsible decisions when facing attacks - not just to protect systems, but to protect people.&lt;/p&gt;

&lt;p&gt;But more than that, this article invites you to reflect on a deeper question:&lt;br&gt;
&lt;strong&gt;- What decision will you take?&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;- Because in cybersecurity, your actions - and the ethics behind them - shape not only your impact on the world but also the kind of professional you become.&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;With great power comes great responsibility. - as dear Uncle Ben once said, Spider-Man (2002)&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Ethical concerns and laws related to counterattacks
&lt;/h2&gt;

&lt;p&gt;Now that you’ve explored how attacks work - and that one day you might have the skills, access, and authority to respond to them - it’s time to talk about something more controversial: counterattacks.&lt;/p&gt;

&lt;p&gt;The idea of striking back may sound tempting. After all, if someone breaks into your system, shouldn’t you have the right to fight back?&lt;br&gt;
But in cybersecurity, things are rarely that simple. What might feel like justice could quickly become a legal or ethical minefield.&lt;/p&gt;

&lt;p&gt;So before you reach for your digital sword, let’s take a closer look at what a &lt;strong&gt;counterattack&lt;/strong&gt; really means - and why, more often than not, professionals choose &lt;strong&gt;defense&lt;/strong&gt; over revenge.&lt;/p&gt;

&lt;h3&gt;
  
  
  United States standpoint on counterattacks
&lt;/h3&gt;

&lt;blockquote&gt;
&lt;p&gt;You can't fight fire with fire. - "The Dark Knight" (2008)&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;In the U.S., deploying a counterattack on a threat actor is illegal because of laws like the Computer Fraud and Abuse Act of 1986 and the Cybersecurity Information Sharing Act of 2015, among others. You can only defend. The act of counterattacking in the U.S. is perceived as an act of vigilantism. A vigilante is a person who is not a member of law enforcement who decides to stop a crime on their own. And because threat actors are criminals, counterattacks can lead to further escalation of the attack, which can cause even more damage and harm. Lastly, if the threat actor in question is a state-sponsored hacktivist, a counterattack can lead to serious international implications. A hacktivist is a person who uses hacking to achieve a political goal. The political goal may be to promote social change or civil disobedience. &lt;/p&gt;

&lt;p&gt;For these reasons, the only individuals in the U.S. who are allowed to counterattack are approved employees of the federal government or military personnel. &lt;/p&gt;

&lt;h3&gt;
  
  
  International standpoint on counterattacks
&lt;/h3&gt;

&lt;p&gt;The International Court of Justice (ICJ), which updates its guidance regularly, states that a person or group can counterattack if: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The counterattack will only affect the party that attacked first.&lt;/li&gt;
&lt;li&gt;The counterattack is a direct communication asking the initial attacker to stop.&lt;/li&gt;
&lt;li&gt;The counterattack does not escalate the situation.&lt;/li&gt;
&lt;li&gt;The counterattack effects can be reversed.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Most organizations avoid counterattacking - and for good reason. It’s not just a matter of hitting back. The legal boundaries are fuzzy, the risks are high, and once you fire that digital shot, you can’t always control where it lands.&lt;/p&gt;

&lt;p&gt;There’s a lot of uncertainty in defining what’s legal and what’s reckless.  In most real-world cases, trying to “hack back” leads to more trouble - technical, legal, and reputational.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;In 2006, the Israeli company Blue Security launched a creative anti-spam service. When users received spam, the system would automatically send opt-out requests back to the spammers - effectively overwhelming them with traffic.&lt;/p&gt;

&lt;p&gt;It worked - for a moment.&lt;/p&gt;

&lt;p&gt;But then a major spammer retaliated with a massive DDoS attack, not only targeting Blue Security but also hitting their DNS provider. The attack disrupted numerous unrelated websites.&lt;/p&gt;

&lt;p&gt;A few weeks later, Blue Security shut down operations entirely. The cost of the counterattack proved too high.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;In cybersecurity, smart defense beats risky retaliation - every time.&lt;/p&gt;

&lt;p&gt;To learn more about specific scenarios and ethical concerns from an international perspective, review updates provided in the &lt;br&gt;
Tallinn Manual online.&lt;/p&gt;

&lt;h2&gt;
  
  
  Ethical principles and methodologies
&lt;/h2&gt;

&lt;p&gt;Because counterattacks are generally disapproved of or illegal, the security realm has created frameworks and controls - such as the CIA triad and others discussed earlier in the articles - to address issues of confidentiality, privacy protections, and laws. To better understand the relationship between these issues and the ethical obligations of cybersecurity professionals, let's review the following key concepts as they relate to using ethics to protect organizations and the people they serve.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Confidentiality&lt;/strong&gt; means that only authorized users can access specific assets or data. Confidentiality as it relates to professional ethics means that there needs to be a high level of respect for privacy to safeguard private assets and data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Privacy protection&lt;/strong&gt; means safeguarding personal information from unauthorized use. &lt;strong&gt;Personally identifiable information (PII)&lt;/strong&gt; and &lt;strong&gt;sensitive personally identifiable information (SPII)&lt;/strong&gt; are types of personal data that can cause people harm if they are stolen. &lt;strong&gt;PII&lt;/strong&gt; data is any information used to infer an individual's identity, like their name and phone number. &lt;strong&gt;SPII&lt;/strong&gt; data is a specific type of PII that falls under stricter handling guidelines, including social security numbers and credit card numbers. To effectively safeguard PII and SPII data, security professionals hold an ethical obligation to secure private information, identify security vulnerabilities, manage organizational risks, and align security with business goals. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Laws&lt;/strong&gt; are rules that are recognized by a community and enforced by a governing entity. As a security professional, you will have an ethical obligation to protect your organization, its internal infrastructure, and the people involved with the organization. To do this:&lt;/p&gt;

&lt;p&gt;You must remain unbiased and conduct your work honestly, responsibly, and with the highest respect for the law. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Be transparent and just, and rely on evidence.&lt;/li&gt;
&lt;li&gt;Ensure that you are consistently invested in the work you are doing, so you can appropriately and ethically address issues that arise. &lt;/li&gt;
&lt;li&gt;Stay informed and strive to advance your skills, so you can contribute to the betterment of the cyber landscape. &lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Let’s say you work for a hospital’s IT team. One morning, you discover that an employee accidentally sent a spreadsheet with patient data - including diagnoses and prescriptions - to the wrong email address. Oops.&lt;/p&gt;

&lt;p&gt;Now, legally (thanks to HIPAA), that counts as a breach of protected health information (PHI). But beyond legal duties, there’s also an ethical question: Would you want someone to tell you if your personal medical info landed in the wrong inbox? Of course you would.&lt;/p&gt;

&lt;p&gt;That’s where your role as a cybersecurity professional becomes more than just technical. You're not just preventing incidents - you're making sure your organization does the right thing when things go wrong. That includes owning up to mistakes, notifying affected patients, and helping rebuild trust.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;p&gt;As a future security professional, ethics will play a major role in your daily work. Knowing the relevant ethics and laws will help you make the right decisions if and when you face a security threat or an incident that results in a breach.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>ethics</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Boring Cybersecurity Theory: Playbook and Zero-day attack</title>
      <dc:creator>Dzmitry Harbachou</dc:creator>
      <pubDate>Tue, 19 Aug 2025 09:00:00 +0000</pubDate>
      <link>https://dev.to/dharbachou/boring-cybersecurity-theory-playbook-and-zero-day-attack-1l03</link>
      <guid>https://dev.to/dharbachou/boring-cybersecurity-theory-playbook-and-zero-day-attack-1l03</guid>
      <description>&lt;p&gt;Previously, you learned that playbooks are tools used by cybersecurity professionals to help identify and respond to security incidents. In this article, we'll explore what playbook is, how it works, and why it is essential in a modern cybersecurity environment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A playbook is a structured document or guide that outlines specific actions and procedures to follow during a security event or operational task. Think of it as a step-by-step manual that ensures consistent, efficient, and effective responses to known threats or incidents&lt;/strong&gt;. Playbooks are predefined, regularly updated, and tailored to an organization’s tools, infrastructure, and threat landscape.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;In simple terms, it’s your go-to response guide: what actions to take, who’s responsible, how to proceed, and in what sequence - when something goes wrong.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Why do you need a playbook?
&lt;/h3&gt;

&lt;p&gt;A playbook is essential in cybersecurity operations because it enables teams to respond to incidents quickly, consistently, and effectively. Without a predefined response plan, decisions made under pressure can be slow, inconsistent, or prone to error.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Let me tell you a story. Some time ago, I was in a cozy town by the sea - not too big, not too small, with just enough charm to make evening walks feel like little rituals. One chilly night, not particularly great for strolling, I found myself walking through the central square.&lt;br&gt;
That’s when I saw them - a pack of dogs, maybe ten or more, running full speed straight in my direction. To be honest, they probably didn’t care about me at all. They charged past without so much as a glance. But I definitely noticed them. My brain went into overdrive: “What do you do when a pack of dogs is running at you?” I had no clue. I’d never been in a situation like that before, and the thoughts in my head were just noise - stay still? run? nothing came together.&lt;br&gt;
While the dogs raced past me, my whole life raced past me too - just for company, I suppose. And then, a minute or two after they were gone, I finally exhaled and kept walking, as if nothing had happened.&lt;br&gt;
It is at moments like these, when you don't know what to do and your brain refuses to help, that you need a guideline. A kind of instruction manual that you can follow without thinking twice. After all, without it, the result could be much worse than a momentary fright.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;A playbook is needed to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;React quickly and correctly&lt;/strong&gt; to incidents&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Correct “human error”&lt;/strong&gt; and errors in a stressful situation&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Automate response&lt;/strong&gt; (in SOAR systems)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Simplify auditing and compliance&lt;/strong&gt; with standards (NIST, ISO, SOC 2, etc.)&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  What is included in the Playbook?
&lt;/h3&gt;

&lt;p&gt;Typically includes:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Script Name: 
  Type of incident (e.g., Phishing Email, Ransomware, DDoS Attack)

Threat Description: 
  Brief summary of the threat - what it looks like, where it appears, how it’s detected

Indicators of Compromise (IoC): 
  Examples: Malicious URLs, IP addresses, email senders, file hashes, domains

Responsible Roles: 
  Who is responsible for each task - e.g., SOC, Incident Response, Legal, HR

Response Steps: 
  Ordered actions - e.g., isolate, analyze, notify, remediate, document

Tools Involved: 
  What systems and platforms are used - SIEM, EDR, SOAR, firewall, email filter, ticketing

Escalation: 
  When to escalate, who to escalate to, and under what conditions

Reporting &amp;amp; Logging: 
  What needs to be recorded, and who needs to receive the final report
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h4&gt;
  
  
  Example: Playbook to phishing email
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Script Name: 
  Phishing Email Incident Response

Threat Description: 
  A user receives an email that appears legitimate but contains a
malicious link or attachment intended to steal credentials or deliver
malware. Typically reported by the user or flagged by an email security gateway.

Indicators of Compromise (IoC): 
  - Sender: hr-support@fakecorp-mail.com
  - URL: http://login.yourbank-secure.com
  - IP: 127.0.0.1
  - Attachment hash: d41d8cd98f00b204e9800998ecf8427e

Responsible Roles: 
  - SOC Analyst: Triage and confirm phishing indicators
  - IR Team: Containment, investigation, coordination
  - IT: Email quarantine and user account monitoring
  - Legal &amp;amp; Compliance: Evaluate reporting obligations
  - HR: Internal communication if needed

Response Steps: 
  1. Confirm phishing attempt using IoCs and headers
  2. Quarantine the email in the mail server
  3. Identify affected users and endpoints
  4. Reset credentials if phishing link was clicked
  5. Block associated URLs and IPs on firewall/proxy
  6. Search for similar messages in the mail system
  7. Document actions and evidence for review
  8. Notify leadership if sensitive data is involved

Tools Involved: 
  - SIEM (e.g., Splunk)
  - Email Security Gateway (e.g., Proofpoint, Mimecast)
  - EDR (e.g., CrowdStrike)
  - Ticketing System (e.g., Jira, ServiceNow)
  - SOAR Platform for automation (if available)

Escalation: 
  - Escalate to CISO if multiple departments affected
  - Escalate to Legal if PII or financial data was involved
  - Severity: Medium → High if credentials were compromised

Reporting &amp;amp; Logging: 
  - Document timestamp of report and response
  - List affected users and actions taken
  - Include relevant logs and IoCs in ticket
  - Final report sent to CISO and retained for audit
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Types of playbooks
&lt;/h3&gt;

&lt;p&gt;Playbooks sometimes cover specific incidents and vulnerabilities. These might include ransomware, vishing, business email compromise (BEC), and other attacks previously discussed. Incident and vulnerability response playbooks are very common, but they are not the only types of playbooks organizations develop. &lt;/p&gt;

&lt;p&gt;Each organization has a different set of playbook tools, methodologies, protocols, and procedures that they adhere to, and different individuals are involved at each step of the response process, depending on the country they are in. For example, incident notification requirements from government-imposed laws and regulations, along with compliance standards, affect the content in the playbooks. These requirements are subject to change based on where the incident originated and the type of data affected. &lt;/p&gt;

&lt;h3&gt;
  
  
  Incident and vulnerability response playbooks
&lt;/h3&gt;

&lt;p&gt;Incident and vulnerability response playbooks are commonly used by entry-level cybersecurity professionals. They are developed based on the goals outlined in an organization’s business continuity plan. A business continuity plan is an established path forward allowing a business to recover and continue to operate as normal, despite a disruption like a security breach.&lt;/p&gt;

&lt;p&gt;These two types of playbooks are similar in that they both contain predefined and up-to-date lists of steps to perform when responding to an incident. Following these steps is necessary to ensure that you, as a security professional, are adhering to legal and organizational standards and protocols. These playbooks also help minimize errors and ensure that important actions are performed within a specific timeframe.&lt;/p&gt;

&lt;p&gt;When an incident, threat, or vulnerability occurs or is identified, the level of risk to the organization depends on the potential damage to its assets. A basic formula for determining the level of risk is that risk equals the likelihood of a threat. For this reason, a sense of urgency is essential. Following the steps outlined in playbooks is also important if any forensic task is being carried out. Mishandling data can easily compromise forensic data, rendering it unusable. &lt;/p&gt;

&lt;p&gt;Common steps included in incident and vulnerability playbooks include: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Preparation&lt;/li&gt;
&lt;li&gt;Detection&lt;/li&gt;
&lt;li&gt;Analysis&lt;/li&gt;
&lt;li&gt;Containment&lt;/li&gt;
&lt;li&gt;Eradication&lt;/li&gt;
&lt;li&gt;Recovery from an incident &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Additional steps include performing post-incident activities, and a coordination of efforts throughout the investigation and incident and vulnerability response stages.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Playbook is not just “documentation,”&lt;/strong&gt; it's your defense under stress.&lt;br&gt;
It makes responding quick, coherent, and gives you confidence that you won't forget important steps.&lt;/p&gt;

&lt;h2&gt;
  
  
  Zero-DAY
&lt;/h2&gt;

&lt;p&gt;What happens when we don’t even know a vulnerability exists - and our playbook has no steps for preventing an attack we can't yet see?&lt;/p&gt;

&lt;p&gt;That’s exactly what makes zero-day attacks so dangerous.&lt;/p&gt;

&lt;p&gt;In cybersecurity, preparation is everything. We rely on detection tools, response plans, and predefined procedures to stay ahead of threats. But zero-day attacks exploit flaws that no one - not vendors, not defenders - has discovered yet. There are no patches, no signatures, no warning.&lt;/p&gt;

&lt;p&gt;These are the kinds of attacks that hit fast, cut deep, and often go unnoticed until the damage is done. In this article, we’ll explore what zero-day attacks are, how they work, and what can be done to defend against threats that, by definition, are unknown - until it’s too late.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;“Zero days ”&lt;/strong&gt; is because developers have &lt;strong&gt;0 days to close the hole&lt;/strong&gt; because it &lt;strong&gt;hasn't been disclosed yet and attacks are already underway&lt;/strong&gt;. As a rule, &lt;strong&gt;no one has time to prepare&lt;/strong&gt;: neither defense systems, nor antiviruses, nor users.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;A zero-day vulnerability is a security flaw in software or hardware that is unknown to the party responsible for fixing it—typically the vendor&lt;/strong&gt;. Because the vulnerability is undiscovered, no patch or mitigation exists to protect against its exploitation. The name "zero-day" reflects the fact that developers have had zero days to fix the flaw before it is or can be exploited.&lt;/p&gt;

&lt;p&gt;This is different from known vulnerabilities, which are publicly disclosed (usually with a CVE identifier) and typically have patches or workarounds. Zero-days are dangerous because they can bypass traditional detection methods like signature-based antivirus tools.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A zero-day attack is the actual exploitation of a zero-day vulnerability&lt;/strong&gt;. Attackers often discover these flaws through their own research or by purchasing them on black markets. Because no patch or fix is available, zero-day exploits are highly valuable to both attackers and defenders.&lt;/p&gt;

&lt;p&gt;Such attacks may be used for espionage, sabotage, data theft, or gaining persistent access to critical systems. Advanced persistent threat (APT) groups, state-sponsored actors, and cybercriminal organizations are known to actively use zero-day exploits.&lt;/p&gt;

&lt;h3&gt;
  
  
  Dictionary:
&lt;/h3&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Term&lt;/th&gt;
&lt;th&gt;Meaning&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;0-day vulnerability&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Unknown vulnerability&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;0-day exploit&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Code exploiting such vulnerability&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;N-day&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Vulnerability already known but not yet fixed everywhere&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h3&gt;
  
  
  Lifecycle of a Zero-Day Exploit
&lt;/h3&gt;

&lt;p&gt;The lifecycle of a zero-day vulnerability typically unfolds in the following stages:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Discovery: A hacker, researcher, or security team identifies a previously unknown flaw.&lt;/li&gt;
&lt;li&gt;Weaponization: An exploit is developed to take advantage of the flaw.&lt;/li&gt;
&lt;li&gt;Exploitation: The exploit is deployed in the wild (e.g., through phishing, malicious websites, or direct compromise).&lt;/li&gt;
&lt;li&gt;Detection: Anomaly detection or threat hunting identifies suspicious behavior.&lt;/li&gt;
&lt;li&gt;Disclosure: The vendor is informed of the flaw (responsibly or otherwise).&lt;/li&gt;
&lt;li&gt;Patch: A fix is developed and rolled out.&lt;/li&gt;
&lt;li&gt;Public Awareness: The vulnerability is assigned a CVE, and defenses are updated.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Sometimes, after public disclosure, attackers continue to exploit systems that haven’t applied the patch. These are called N-day attacks.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why Is a Zero-Day Attack So Dangerous?
&lt;/h3&gt;

&lt;p&gt;Zero-day attacks are among the most dangerous types of cyber threats - not because they’re always the most complex, but because they leave no time to prepare. By their very nature, they exploit weaknesses that no one has patched, documented, or even seen coming.&lt;/p&gt;

&lt;p&gt;Here’s what makes zero-day threats so uniquely dangerous:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;They bypass all known signatures. Traditional defenses like antivirus, IDS/IPS, and firewalls rely on known patterns and threat intelligence. A zero-day exploit, however, uses a vulnerability that hasn’t been catalogued yet - meaning there are no rules to catch it.&lt;/li&gt;
&lt;li&gt;You can’t defend against something you don’t know exists. Until a patch is developed and distributed, defenders are left guessing. The only protection is behavior-based monitoring or strict isolation - and even those may fail if the exploit is subtle.&lt;/li&gt;
&lt;li&gt;They are often used in targeted, high-stakes attacks. Advanced Persistent Threat (APT) groups, state-sponsored hackers, and cybercriminals use zero-day exploits to quietly breach high-value targets. These attacks are typically part of espionage campaigns, not random crime.&lt;/li&gt;
&lt;li&gt;They enable deep compromise. A zero-day vulnerability can allow attackers to escalate privileges, execute arbitrary code (RCE), or exfiltrate sensitive data - all while staying under the radar. By the time they're detected, the attackers may have already achieved their objective.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In short, zero-day exploits don't knock at the front door - they slip through an invisible crack in the foundation.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;At a cybersecurity conference, a group of researchers took the stage to show off their latest achievement: a supposedly secure, enterprise-grade network printer. According to them, it had been thoroughly hardened against attacks and was ready for the modern office battlefield. The audience listened politely - until, in the middle of the presentation, the demo printer they brought with them suddenly came to life and began to print.&lt;br&gt;
Out came a single page with a simple message: “Nice talk. You might want to patch this.” Someone in the audience had just exploited a zero-day vulnerability in the printer’s firmware - during the talk - to send a cheeky, perfectly timed warning. The crowd erupted. The researchers laughed (nervously), and everyone walked away with a valuable lesson: never trust a quiet printer - especially at a hacker conference.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  How do you fight zero-day??
&lt;/h3&gt;

&lt;p&gt;It is &lt;strong&gt;impossible&lt;/strong&gt; to completely prevent zero-day, but it is possible to &lt;strong&gt;reduce risk and damage&lt;/strong&gt;:&lt;/p&gt;

&lt;h5&gt;
  
  
  &lt;strong&gt;1. Minimum Rights Principle&lt;/strong&gt;
&lt;/h5&gt;

&lt;ul&gt;
&lt;li&gt;Limit the rights of users and applications&lt;/li&gt;
&lt;li&gt;Even if 0-day gives access, an attacker will not get root&lt;/li&gt;
&lt;/ul&gt;

&lt;h5&gt;
  
  
  &lt;strong&gt;2. Network Segmentation&lt;/strong&gt;
&lt;/h5&gt;

&lt;ul&gt;
&lt;li&gt;Isolate critical systems (DMZ, VLAN)&lt;/li&gt;
&lt;li&gt;Prevent the attack from spreading across the infrastructure.&lt;/li&gt;
&lt;/ul&gt;

&lt;h5&gt;
  
  
  &lt;strong&gt;3. Behavioral analytics (UEBA, EDR, XDR)&lt;/strong&gt;
&lt;/h5&gt;

&lt;ul&gt;
&lt;li&gt;These systems analyze &lt;strong&gt;behavioral anomalies&lt;/strong&gt; rather than signatures&lt;/li&gt;
&lt;li&gt;This is one of the most effective ways to catch a 0-day attack.&lt;/li&gt;
&lt;/ul&gt;

&lt;h5&gt;
  
  
  &lt;strong&gt;4. Rapid software updates&lt;/strong&gt;
&lt;/h5&gt;

&lt;ul&gt;
&lt;li&gt;Once a 0-day is disclosed, it becomes &lt;strong&gt;N-day&lt;/strong&gt; - and the patch goes out&lt;/li&gt;
&lt;li&gt;It's important to &lt;strong&gt;have an automated update process&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h5&gt;
  
  
  &lt;strong&gt;5. Virtualization and containerization&lt;/strong&gt;
&lt;/h5&gt;

&lt;ul&gt;
&lt;li&gt;Running software in a restricted container reduces RCE damage.&lt;/li&gt;
&lt;/ul&gt;

&lt;h5&gt;
  
  
  &lt;strong&gt;6. Threat Intelligence&lt;/strong&gt;
&lt;/h5&gt;

&lt;ul&gt;
&lt;li&gt;Subscriptions to IOCs, MITRE ATT&amp;amp;CK, TI feeds&lt;/li&gt;
&lt;li&gt;Help learn about new vulnerabilities before CVEs are published&lt;/li&gt;
&lt;/ul&gt;

&lt;h5&gt;
  
  
  &lt;strong&gt;7. Playbook and Response Plan&lt;/strong&gt;
&lt;/h5&gt;

&lt;ul&gt;
&lt;li&gt;Incident preparedness is half of success&lt;/li&gt;
&lt;li&gt;Responding quickly to anomalies minimizes losses&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  What to do right now (if you want to get ready for 0-day)?:
&lt;/h3&gt;

&lt;p&gt;It's simple: the more layers of defense you implement and the more advanced the tools you use, the harder it will be to attack you - but that's where the simplicity ends. There is no universal approach to defense against zero-day attacks, because it all depends on what you are protecting and what resources you have for it - money, specialists, tools. Not everyone needs overprotection: loss of logs on an auxiliary server will most likely not lead to application shutdown, while leakage of users' personal data may entail both legal and reputational consequences. Therefore, it is important to properly assess your assets, risks, and capabilities to build the protection that is appropriate and effective in your context.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Zero-day is not if, but when. It is impossible to defend against it 100%, but you can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Limit the radius of attack&lt;/li&gt;
&lt;li&gt;Quickly detect an attack&lt;/li&gt;
&lt;li&gt;Quickly react and recover.&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Interconnectivity in practice:
&lt;/h2&gt;

&lt;p&gt;In real-world scenarios, cyber incidents rarely happen in isolation. A zero-day vulnerability on its own isn’t a threat - until it’s exploited. Detection doesn’t rely on known patterns, and response often unfolds in uncertainty. That’s where interconnectivity between concepts like zero-day, detection strategies, and incident response playbooks becomes critical.&lt;br&gt;
The table below shows how these elements interact in a typical modern attack:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Component&lt;/th&gt;
&lt;th&gt;Role in the incident&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Zero-day&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Unknown vulnerability exploited before a fix exists&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Attack (exploit)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Leverages the zero-day to gain initial access or execute malicious actions&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Triggered not by known signatures, but via behavioral analysis and anomalies&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Playbook&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Provides a structured response, even without specific indicators or prior knowledge&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h3&gt;
  
  
  More details about Playbook and Zero-day
&lt;/h3&gt;

&lt;p&gt;Playbook for 0-day incidents is usually not "tailored" to a specific vulnerability, but to the impact and type of attack:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Suspicious traffic&lt;/li&gt;
&lt;li&gt;RCE attack&lt;/li&gt;
&lt;li&gt;File encryption&lt;/li&gt;
&lt;li&gt;Public service penetration&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The table below illustrates how a zero-day vulnerability and a playbook interact during a security incident.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Zero-Day&lt;/th&gt;
&lt;th&gt;Playbook&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Unknown vulnerability&lt;/td&gt;
&lt;td&gt;Template for responding to an unknown threat&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Causes unexpected incidents&lt;/td&gt;
&lt;td&gt;Gives a structured response to incidents&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;May not be detected by signatures&lt;/td&gt;
&lt;td&gt;Response is built on &lt;strong&gt;behavior and consequences&lt;/strong&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Need fast response&lt;/td&gt;
&lt;td&gt;Playbook gives &lt;strong&gt;steps, roles, tools&lt;/strong&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;That is, it answers not "what exactly was hacked?" but "what to do if we &lt;strong&gt;detect strange activity that looks like an attack&lt;/strong&gt;".&lt;/p&gt;




&lt;p&gt;Facing a zero-day is like walking across the ocean floor - deep, dark, and full of unknowns. No signs. No safety nets. Just your wits and whatever plan you managed to carry with you.&lt;/p&gt;

&lt;p&gt;Reacting quickly, with confidence, may look reckless to some - even foolish.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“You’re either incredibly brave or incredibly stupid,” as Barbossa once said.&lt;br&gt;
“But then again… it’s two sides of the same coin.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;And that’s exactly what zero-days and playbooks are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;One is chaos, the other is control.&lt;/li&gt;
&lt;li&gt;One is unknown, the other is prepared response.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In the end, you can’t stop every attack - but you can choose which side of the coin you stand on when it hits.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>beginners</category>
      <category>theory</category>
    </item>
    <item>
      <title>Boring Cybersecurity Theory: Frameworks (NIST)</title>
      <dc:creator>Dzmitry Harbachou</dc:creator>
      <pubDate>Mon, 18 Aug 2025 09:00:00 +0000</pubDate>
      <link>https://dev.to/dharbachou/boring-cybersecurity-theory-frameworks-nist-5cl5</link>
      <guid>https://dev.to/dharbachou/boring-cybersecurity-theory-frameworks-nist-5cl5</guid>
      <description>&lt;p&gt;Previously, you learned how organizations use security frameworks and controls to protect against threats, risks, and vulnerabilities. Now let’s dive a bit deeper into the NIST Cybersecurity Framework, a go-to tool for many organizations and one of the most commonly used standards in the cybersecurity world. &lt;/p&gt;

&lt;p&gt;This framework has been created by the U.S. National Institute of Standards and Technology and is used all over the world. It is used by large corporations, banks, technology giants, and even government agencies because it helps build a reliable, logical, and scalable security system.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The NIST CSF&lt;/strong&gt; (National Institute of Standards and Technology Cybersecurity Framework) is a set of recommendations and best practices for organizing cybersecurity. It &lt;strong&gt;was developed to provide a structured approach for managing information security risks within companies and government organizations.&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  NIST CSF includes five key steps (functions):
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftbvhx2trogmg2l4fv243.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftbvhx2trogmg2l4fv243.png" alt=" " width="800" height="689"&gt;&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;1. Identify - understand what needs to be protected (assets, risks)
2. Protect - establish protection measures (access control, encryption)
3. Detect - detect the threat (monitoring, logging)
4. Respond - react (response plan)
5. Recover - recover from the incident
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h3&gt;
  
  
  1. Identify
&lt;/h3&gt;

&lt;p&gt;The first step in any effective cybersecurity program is understanding what needs protection. The Identify function focuses on gaining visibility into your organization’s digital landscape.&lt;/p&gt;

&lt;p&gt;This includes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Creating an inventory of all digital and physical assets.&lt;/li&gt;
&lt;li&gt;Understanding the business context and risk environment.&lt;/li&gt;
&lt;li&gt;Defining roles, responsibilities, and governance structures.&lt;/li&gt;
&lt;li&gt;Conducting risk assessments and mapping out potential vulnerabilities.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By clearly identifying what is at stake, organizations can prioritize their cybersecurity efforts and allocate resources more efficiently.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Protect
&lt;/h3&gt;

&lt;p&gt;Once assets and risks have been identified, the next step is implementing safeguards to ensure their security. The Protect function is about proactive defense.&lt;/p&gt;

&lt;p&gt;This involves:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Enforcing access controls and authentication mechanisms (e.g., MFA).&lt;/li&gt;
&lt;li&gt;Encrypting sensitive data in transit and at rest.&lt;/li&gt;
&lt;li&gt;Conducting regular security training and awareness programs.&lt;/li&gt;
&lt;li&gt;Implementing secure software development practices.&lt;/li&gt;
&lt;li&gt;Applying physical and environmental controls for infrastructure.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Effective protection minimizes the chances of a successful attack and strengthens organizational resilience.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Detect
&lt;/h3&gt;

&lt;p&gt;Despite the best protection measures, no system is immune to threats. The Detect function is crucial for identifying anomalies and incidents as early as possible.&lt;/p&gt;

&lt;p&gt;Key elements include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Real-time monitoring of networks and systems.&lt;/li&gt;
&lt;li&gt;Logging and analyzing events and security data.&lt;/li&gt;
&lt;li&gt;Utilizing tools like SIEM, IDS/IPS, and behavioral analytics.&lt;/li&gt;
&lt;li&gt;Setting alerts and thresholds for suspicious activities.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Early detection enables faster responses and reduces the potential impact of a security breach.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Respond
&lt;/h3&gt;

&lt;p&gt;When a cybersecurity incident occurs, the ability to respond swiftly and effectively is essential. The Respond function focuses on containing the threat and managing the fallout.&lt;/p&gt;

&lt;p&gt;This entails:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Having a well-documented incident response plan.&lt;/li&gt;
&lt;li&gt;Assigning responsibilities and decision-making authority.&lt;/li&gt;
&lt;li&gt;Communicating with internal stakeholders and possibly external parties.&lt;/li&gt;
&lt;li&gt;Conducting root cause analysis.&lt;/li&gt;
&lt;li&gt;Adjusting defenses and procedures based on lessons learned.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A coordinated response helps limit damage, protect reputation, and meet compliance requirements.&lt;/p&gt;

&lt;h3&gt;
  
  
  5. Recover
&lt;/h3&gt;

&lt;p&gt;Finally, the Recover function addresses how to return to normal operations after an incident. Recovery is not just about restoring data, but also about improving future resilience.&lt;/p&gt;

&lt;p&gt;Important steps include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Restoring systems and data from backups.&lt;/li&gt;
&lt;li&gt;Validating the integrity of restored assets.&lt;/li&gt;
&lt;li&gt;Reviewing incident reports and response effectiveness.&lt;/li&gt;
&lt;li&gt;Updating policies, tools, and procedures.&lt;/li&gt;
&lt;li&gt;Communicating recovery status to stakeholders.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A structured recovery process ensures operational continuity and strengthens the organization’s ability to handle future incidents.&lt;/p&gt;

&lt;h2&gt;
  
  
  Example in Action: "SQL Injection in a Web Application"
&lt;/h2&gt;

&lt;p&gt;Below, you can see how the stages of the NIST CSF align with the phases of a cyber attack incident.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Stage at NIST&lt;/th&gt;
&lt;th&gt;What happens&lt;/th&gt;
&lt;th&gt;Direction&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Identify&lt;/td&gt;
&lt;td&gt;Register asset (application), perform risk analysis&lt;/td&gt;
&lt;td&gt;Application Security, GRC&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Protect&lt;/td&gt;
&lt;td&gt;Implement data validation, WAF&lt;/td&gt;
&lt;td&gt;Application Security&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Detect&lt;/td&gt;
&lt;td&gt;WAF or SIEM detects SQL injection attempt&lt;/td&gt;
&lt;td&gt;SOC, monitoring&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Respond&lt;/td&gt;
&lt;td&gt;Activate incident management&lt;/td&gt;
&lt;td&gt;Operational Security&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Recover&lt;/td&gt;
&lt;td&gt;Patch, report, revise DevSecOps processes&lt;/td&gt;
&lt;td&gt;Operational Security, GRC&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;This incident illustrates how important it is to have a structured approach to security-and that's where the NIST Framework comes in. It helps you not just put out fires after attacks, but build defenses up front, from identifying vulnerable systems to timely response and recovery. NIST is not a theory, but a practical framework that allows you to systematically manage risk and prevent similar incidents in the future.&lt;/p&gt;




&lt;p&gt;The NIST Cybersecurity Framework provides a clear, actionable structure for managing cybersecurity risks across the lifecycle of an attack. By understanding and applying each of the five core functions, organizations can build a robust defense strategy that not only reacts to threats but anticipates and mitigates them in advance.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>theory</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Boring Cybersecurity Theory: Controls, Frameworks, and Compliance</title>
      <dc:creator>Dzmitry Harbachou</dc:creator>
      <pubDate>Fri, 15 Aug 2025 09:00:00 +0000</pubDate>
      <link>https://dev.to/dharbachou/boring-cybersecurity-theory-controls-frameworks-and-compliance-llc</link>
      <guid>https://dev.to/dharbachou/boring-cybersecurity-theory-controls-frameworks-and-compliance-llc</guid>
      <description>&lt;p&gt;A framework is like a treasure map, a medkit, and a compass all rolled into one - it helps beginners avoid chaos and lets pros act with strategy and confidence. It saves time, covers blind spots, makes teamwork smoother, and boosts your credibility with recruiters. Instead of playing a “guessing game,” you'll be following a smart, battle-tested plan used by thousands of professionals before you.&lt;/p&gt;

&lt;h2&gt;
  
  
  Frameworks
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Security frameworks&lt;/strong&gt; are guidelines used for building plans to help mitigate risk and threats to data and privacy. Frameworks support organizations’ ability to adhere to compliance laws and regulations. For example, the healthcare industry uses frameworks to comply with the United States’ Health Insurance Portability and Accountability Act (HIPAA), which requires that medical professionals keep patient information safe. &lt;/p&gt;

&lt;p&gt;Cybersecurity area has its own frameworks - these are ready-made schemes that simplify work. They play a key role in helping businesses comply with industry regulations and laws. For instance, healthcare organizations in the U.S. rely on frameworks to meet the requirements of HIPAA - a law that mandates the protection of patients’ personal health information.&lt;/p&gt;

&lt;p&gt;In cybersecurity, frameworks act like prebuilt roadmaps. Rather than figuring out what to do from scratch in every situation, you follow a well-defined structure that walks you through each stage - from risk assessment and threat detection to incident response and recovery. They help teams distribute responsibilities, streamline decision-making, and reduce the chance of human error during high-stress moments.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Specifications and guidelines can change depending on the type of organization you work for.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Below are some of the other well-known frameworks commonly used in the world of cybersecurity. Each one offers a different approach depending on the organization’s size, industry, and regulatory needs:&lt;/p&gt;

&lt;h3&gt;
  
  
  The Federal Energy Regulatory Commission - North American Electric Reliability Corporation (FERC-NERC)
&lt;/h3&gt;

&lt;p&gt;FERC-NERC is a regulation that applies to organizations that work with electricity or that are involved with the U.S. and North American power grid. These types of organizations have an obligation to prepare for, mitigate, and report any potential security incident that can negatively affect the power grid. They are also legally required to adhere to the Critical Infrastructure Protection (CIP) Reliability Standards defined by the FERC. &lt;/p&gt;

&lt;h3&gt;
  
  
  The Federal Risk and Authorization Management Program (FedRAMP®)
&lt;/h3&gt;

&lt;p&gt;FedRAMP is a U.S. federal government program that standardizes security assessment, authorization, monitoring, and handling of cloud services and product offerings. Its purpose is to provide consistency across the government sector and third-party cloud providers. &lt;/p&gt;

&lt;h3&gt;
  
  
  Center for Internet Security (CIS®)
&lt;/h3&gt;

&lt;p&gt;CIS is a nonprofit with multiple areas of emphasis. It provides a set of controls that can be used to safeguard systems and networks against attacks. Its purpose is to help organizations establish a better plan of defense. CIS also provides actionable controls that security professionals may follow if a security incident occurs. &lt;/p&gt;

&lt;h3&gt;
  
  
  General Data Protection Regulation (GDPR)
&lt;/h3&gt;

&lt;p&gt;GDPR is a European Union (E.U.) general data regulation that protects the processing of E.U. residents’ data and their right to privacy in and out of E.U. territory. For example, if an organization is not being transparent about the data they are holding about an E.U. citizen and why they are holding that data, this is an infringement that can result in a fine to the organization. Additionally, if a breach occurs and an E.U. citizen’s data is compromised, they must be informed. The affected organization has 72 hours to notify the E.U. citizen about the breach.&lt;/p&gt;

&lt;h3&gt;
  
  
  Payment Card Industry Data Security Standard (PCI DSS)
&lt;/h3&gt;

&lt;p&gt;PCI DSS is an international security standard meant to ensure that organizations storing, accepting, processing, and transmitting credit card information do so in a secure environment. The objective of this compliance standard is to reduce credit card fraud. &lt;/p&gt;

&lt;h3&gt;
  
  
  The Health Insurance Portability and Accountability Act (HIPAA)
&lt;/h3&gt;

&lt;p&gt;HIPAA is a U.S. federal law established in 1996 to protect patients' health information. This law prohibits patient information from being shared without their consent. It is governed by three rules: &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Privacy&lt;/li&gt;
&lt;li&gt;Security &lt;/li&gt;
&lt;li&gt;Breach notification&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Organizations that store patient data have a legal obligation to inform patients of a breach because if patients' &lt;strong&gt;Protected Health Information (PHI)&lt;/strong&gt; is exposed, it can lead to identity theft and insurance fraud. PHI relates to the past, present, or future physical or mental health or condition of an individual, whether it’s a plan of care or payments for care. Along with understanding HIPAA as a law, security professionals also need to be familiar with the Health Information Trust Alliance (HITRUST®), which is a security framework and assurance program that helps institutions meet HIPAA compliance.&lt;/p&gt;

&lt;h3&gt;
  
  
  International Organization for Standardization (ISO)
&lt;/h3&gt;

&lt;p&gt;ISO was created to establish international standards related to technology, manufacturing, and management across borders. It helps organizations improve their processes and procedures for staff retention, planning, waste, and services. &lt;/p&gt;

&lt;h3&gt;
  
  
  System and Organizations Controls (SOC type 1, SOC type 2)
&lt;/h3&gt;

&lt;p&gt;The American Institute of Certified Public Accountants® (AICPA) auditing standards board developed this standard. The SOC1 and SOC2 are a series of reports that focus on an organization's user access policies at different organizational levels such as: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Associate&lt;/li&gt;
&lt;li&gt;Supervisor&lt;/li&gt;
&lt;li&gt;Manager&lt;/li&gt;
&lt;li&gt;Executive&lt;/li&gt;
&lt;li&gt;Vendor &lt;/li&gt;
&lt;li&gt;Others &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;They are used to assess an organization’s financial compliance and levels of risk. They also cover confidentiality, privacy, integrity, availability, security, and overall data safety. Control failures in these areas can lead to fraud.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;There are a number of regulations that are frequently revised. You are encouraged to keep up-to-date with changes and explore more frameworks, controls, and compliance. Two suggestions to research: the Gramm-Leach-Bliley Act and the Sarbanes-Oxley Act.&lt;/strong&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Controls
&lt;/h1&gt;

&lt;p&gt;&lt;strong&gt;Security controls&lt;/strong&gt; are safeguards designed to reduce specific security risks. Security controls are the measures organizations use to lower risk and threats to data and privacy. For example, a control that can be used alongside frameworks to ensure a hospital remains compliant with HIPAA is requiring that patients use multi-factor authentication (MFA) to access their medical records. Using a measure like MFA to validate someone’s identity is one way to help mitigate potential risks and threats to private data.&lt;/p&gt;

&lt;p&gt;Controls often work in tandem with security frameworks. While frameworks provide structure and strategy, controls are the specific actions that help enforce them. For example, to comply with HIPAA in a healthcare setting, a control might involve requiring multi-factor authentication (MFA) for patients accessing their medical records. This helps ensure that only authorized users can access sensitive information.&lt;/p&gt;

&lt;p&gt;Security controls are generally grouped into three categories: physical, technical, and administrative. Each type plays a different role in preventing, detecting, or correcting security issues.&lt;/p&gt;

&lt;p&gt;Examples of physical controls:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Gates, fences, and locks&lt;/li&gt;
&lt;li&gt;Security guards&lt;/li&gt;
&lt;li&gt;Closed-circuit television (CCTV), surveillance cameras, and motion detectors&lt;/li&gt;
&lt;li&gt;Access cards or badges to enter office spaces&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Examples of technical controls:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Firewalls&lt;/li&gt;
&lt;li&gt;MFA&lt;/li&gt;
&lt;li&gt;Antivirus software&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Examples of administrative controls:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Separation of duties&lt;/li&gt;
&lt;li&gt;Authorization&lt;/li&gt;
&lt;li&gt;Asset classification&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By layering these types of controls, organizations can create defense-in-depth - a strategy that helps ensure no single point of failure leads to compromise. Together with frameworks, controls form the practical foundation of any effective cybersecurity strategy.&lt;/p&gt;

&lt;h2&gt;
  
  
  Specific frameworks and controls
&lt;/h2&gt;

&lt;p&gt;There are many different frameworks and controls that organizations can use to remain compliant with regulations and achieve their security goals. Frameworks covered in this reading are the Cyber Threat Framework (CTF) and the International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27001. Several common security controls, used alongside these types of frameworks, are also explained.&lt;/p&gt;

&lt;h3&gt;
  
  
  Cyber Threat Framework (CTF)
&lt;/h3&gt;

&lt;p&gt;According to the Office of the Director of National Intelligence, the CTF was developed by the U.S. government to provide “a common language for describing and communicating information about cyber threat activity.” By providing a common language to communicate information about threat activity, the CTF helps cybersecurity professionals analyze and share information more efficiently. This allows organizations to improve their response to the constantly evolving cybersecurity landscape and threat actors' many tactics and techniques.&lt;/p&gt;

&lt;h3&gt;
  
  
  International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27001
&lt;/h3&gt;

&lt;p&gt;An internationally recognized and used framework is ISO/IEC 27001. The ISO 27000 family of standards enables organizations of all sectors and sizes to manage the security of assets, such as financial information, intellectual property, employee data, and information entrusted to third parties. This framework outlines requirements for an information security management system, best practices, and controls that support an organization’s ability to manage risks. Although the ISO/IEC 27001 framework does not require the use of specific controls, it does provide a collection of controls that organizations can use to improve their security posture.  &lt;/p&gt;




&lt;p&gt;Security frameworks give you the &lt;em&gt;&lt;strong&gt;“why”&lt;/strong&gt;&lt;/em&gt; and &lt;em&gt;&lt;strong&gt;“what”&lt;/strong&gt;&lt;/em&gt;, while controls give you the &lt;em&gt;&lt;strong&gt;“how”&lt;/strong&gt;&lt;/em&gt;. Together, they help organizations build structured, defensible, and compliant cybersecurity programs - capable of adapting to the ever-changing risk landscape.&lt;/p&gt;

&lt;p&gt;As a security specialist, you don’t need to remember every framework out there. But understanding the core ones and how they shape real-world security decisions - is key. Especially as the threat landscape keeps evolving, being familiar with these structures helps you protect both the systems you defend and the people behind them.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>theory</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Boring Cybersecurity Theory: Security Domains From CISSP</title>
      <dc:creator>Dzmitry Harbachou</dc:creator>
      <pubDate>Thu, 14 Aug 2025 09:00:00 +0000</pubDate>
      <link>https://dev.to/dharbachou/boring-cybersecurity-theory-security-domains-from-cissp-3c9d</link>
      <guid>https://dev.to/dharbachou/boring-cybersecurity-theory-security-domains-from-cissp-3c9d</guid>
      <description>&lt;p&gt;Now that we have looked at security from one side, it's time to look at it from another. If you're reading this article, chances are you're involved in IT in some way - and you likely know that companies typically divide responsibilities by roles and domains. The same principle applies to cybersecurity.&lt;/p&gt;

&lt;p&gt;Cybersecurity is a &lt;strong&gt;broad field&lt;/strong&gt; that is divided into many areas depending on &lt;strong&gt;what is being protected&lt;/strong&gt;, &lt;strong&gt;from what&lt;/strong&gt; and &lt;strong&gt;by what means&lt;/strong&gt;. There are eight commonly recognized domains of cybersecurity, each with its own responsibilities and specific area of focus.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fihgdlhxxojml5r24fmhb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fihgdlhxxojml5r24fmhb.png" alt=" " width="800" height="388"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Domain One: Security and risk management
&lt;/h2&gt;

&lt;p&gt;All organizations must develop their security posture. Security posture is an organization’s ability to manage its defense of critical assets and data and react to change. Elements of the security and risk management domain that impact an organization's security posture include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Security goals and objectives&lt;/li&gt;
&lt;li&gt;Risk mitigation processes&lt;/li&gt;
&lt;li&gt;Compliance&lt;/li&gt;
&lt;li&gt;Business continuity plans&lt;/li&gt;
&lt;li&gt;Legal regulations&lt;/li&gt;
&lt;li&gt;Professional and organizational ethics&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Information security, or InfoSec, is also related to this domain and refers to a set of processes established to secure information. An organization may use playbooks and implement training as a part of their security and risk management program, based on their needs and perceived risk. There are many InfoSec design processes, such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Incident response&lt;/li&gt;
&lt;li&gt;Vulnerability management&lt;/li&gt;
&lt;li&gt;Application security&lt;/li&gt;
&lt;li&gt;Cloud security&lt;/li&gt;
&lt;li&gt;Infrastructure security&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As an example, a security team may need to alter how personally identifiable information (PII) is treated in order to adhere to the European Union's General Data Protection Regulation (GDPR).&lt;/p&gt;

&lt;h2&gt;
  
  
  Domain two: Asset security
&lt;/h2&gt;

&lt;p&gt;Asset security involves managing the cybersecurity processes of organizational assets, including the storage, maintenance, retention, and destruction of physical and virtual data. Because the loss or theft of assets can expose an organization and increase the level of risk, keeping track of assets and the data they hold is essential. Conducting a security impact analysis, establishing a recovery plan, and managing data exposure will depend on the level of risk associated with each asset. Security analysts may need to store, maintain, and retain data by creating backups to ensure they are able to restore the environment if a security incident places the organization’s data at risk.&lt;/p&gt;

&lt;h2&gt;
  
  
  Domain three: Security architecture and engineering
&lt;/h2&gt;

&lt;p&gt;This domain focuses on managing data security. Ensuring effective tools, systems, and processes are in place helps protect an organization’s assets and data. Security architects and engineers create these processes.&lt;/p&gt;

&lt;p&gt;One important aspect of this domain is the concept of shared responsibility. Shared responsibility means all individuals involved take an active role in lowering risk during the design of a security system. Additional design principles related to this domain, which are discussed later in the program, include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Threat modeling&lt;/li&gt;
&lt;li&gt;Least privilege&lt;/li&gt;
&lt;li&gt;Defense in depth&lt;/li&gt;
&lt;li&gt;Fail securely&lt;/li&gt;
&lt;li&gt;Separation of duties&lt;/li&gt;
&lt;li&gt;Keep it simple&lt;/li&gt;
&lt;li&gt;Zero trust&lt;/li&gt;
&lt;li&gt;Trust but verify&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;An example of managing data is the use of a security information and event management (SIEM) tool to monitor for flags related to unusual login or user activity that could indicate a threat actor is attempting to access private data.&lt;/p&gt;

&lt;h2&gt;
  
  
  Domain four: Communication and network security
&lt;/h2&gt;

&lt;p&gt;This domain focuses on managing and securing physical networks and wireless communications. This includes on-site, remote, and cloud communications. &lt;/p&gt;

&lt;p&gt;Organizations with remote, hybrid, and on-site work environments must ensure data remains secure, but managing external connections to make certain that remote workers are securely accessing an organization’s networks is a challenge. Designing network security controls - such as restricted network access - can help protect users and ensure an organization’s network remains secure when employees travel or work outside of the main office. &lt;/p&gt;

&lt;h2&gt;
  
  
  Domain five: Identity and access management
&lt;/h2&gt;

&lt;p&gt;The identity and access management (IAM) domain focuses on keeping data secure. It does this by ensuring user identities are trusted and authenticated and that access to physical and logical assets is authorized. This helps prevent unauthorized users, while allowing authorized users to perform their tasks.&lt;/p&gt;

&lt;p&gt;Essentially, IAM uses what is referred to as the principle of least privilege, which is the concept of granting only the minimal access and authorization required to complete a task. As an example, a cybersecurity analyst might be asked to ensure that customer service representatives can only view the private data of a customer, such as their phone number, while working to resolve the customer's issue; then remove access when the customer's issue is resolved.&lt;/p&gt;

&lt;h2&gt;
  
  
  Domain six: Security assessment and testing
&lt;/h2&gt;

&lt;p&gt;The security assessment and testing domain focuses on identifying and mitigating risks, threats, and vulnerabilities. Security assessments help organizations determine whether their internal systems are secure or at risk. Organizations might employ penetration testers, often referred to as “pen testers,” to find vulnerabilities that could be exploited by a threat actor. &lt;/p&gt;

&lt;p&gt;This domain suggests that organizations conduct security control testing, as well as collect and analyze data. Additionally, it emphasizes the importance of conducting security audits to monitor for and reduce the probability of a data breach. To contribute to these types of tasks, cybersecurity professionals may be tasked with auditing user permissions to validate that users have the correct levels of access to internal systems.&lt;/p&gt;

&lt;h2&gt;
  
  
  Domain seven: Security operations
&lt;/h2&gt;

&lt;p&gt;The security operations domain focuses on the investigation of a potential data breach and the implementation of preventative measures after a security incident has occurred. This includes using strategies, processes, and tools such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Training and awareness&lt;/li&gt;
&lt;li&gt;Reporting and documentation&lt;/li&gt;
&lt;li&gt;Intrusion detection and prevention&lt;/li&gt;
&lt;li&gt;SIEM tools
&lt;/li&gt;
&lt;li&gt;Log management&lt;/li&gt;
&lt;li&gt;Incident management&lt;/li&gt;
&lt;li&gt;Playbooks&lt;/li&gt;
&lt;li&gt;Post-breach forensics&lt;/li&gt;
&lt;li&gt;Reflecting on lessons learned&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The cybersecurity professionals involved in this domain work as a team to manage, prevent, and investigate threats, risks, and vulnerabilities. These individuals are trained to handle active attacks, such as large amounts of data being accessed from an organization's internal network, outside of normal working hours. Once a threat is identified, the team works diligently to keep private data and information safe from threat actors.  &lt;/p&gt;

&lt;h2&gt;
  
  
  Domain eight: Software development security
&lt;/h2&gt;

&lt;p&gt;The software development security domain is focused on using secure programming practices and guidelines to create secure applications. Having secure applications helps deliver secure and reliable services, which helps protect organizations and their users.&lt;/p&gt;

&lt;p&gt;Security must be incorporated into each element of the software development life cycle, from design and development to testing and release. To achieve security, the software development process must have security in mind at each step. Security cannot be an afterthought.&lt;/p&gt;

&lt;p&gt;Performing application security tests can help ensure vulnerabilities are identified and mitigated accordingly. Having a system in place to test the programming conventions, software executables, and security measures embedded in the software is necessary. Having quality assurance and pen tester professionals ensure the software has met security and performance standards is also an essential part of the software development process. For example, an entry-level analyst working for a pharmaceutical company might be asked to make sure encryption is properly configured for a new medical device that will store private patient data. &lt;/p&gt;




&lt;p&gt;I hope this brief dive into the CISSP security domains has given you a clearer sense of the structure behind cybersecurity. It may seem like a maze of terms, frameworks, and controls, but together they form the blueprint for protecting information in a chaotic digital world. Even if the details fade, remembering that security is built on multiple interconnected layers can help you see the bigger picture - and spot the gaps before someone else does.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>beginners</category>
      <category>theory</category>
    </item>
    <item>
      <title>Boring Cybersecurity Theory: Risk Management</title>
      <dc:creator>Dzmitry Harbachou</dc:creator>
      <pubDate>Wed, 13 Aug 2025 15:50:34 +0000</pubDate>
      <link>https://dev.to/dharbachou/boring-cybersecurity-theory-risk-management-54j4</link>
      <guid>https://dev.to/dharbachou/boring-cybersecurity-theory-risk-management-54j4</guid>
      <description>&lt;p&gt;Previously, we learned how security involves protecting organizations and people from threats, risks, and vulnerabilities. Understanding the current threat landscapes gives organizations the ability to create policies and processes designed to help prevent and mitigate these types of security issues. In this reading, you will further explore how to manage risk, so you are better prepared to protect organizations and the people they serve when you enter the cybersecurity field. &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;A 158-year-old company, KNP, collapsed within just three months after hackers from the Akira ransomware group guessed a single weak employee password. The result? £5 million in ransom demands, encrypted data, deleted backups, and 700 employees out of work. One mistake was all it took to bring down a century-old business.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  Why is it &lt;strong&gt;Critical&lt;/strong&gt;?
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;There’s a dangerous myth in cybersecurity: “&lt;strong&gt;&lt;em&gt;We’re too small to be a target.&lt;/em&gt;&lt;/strong&gt;”&lt;/p&gt;

&lt;p&gt;The truth? Cybercriminals don’t care about your company’s size - only about how easy you are to breach. A poorly configured server, an outdated system, or a single weak password can be enough to put you on their radar.&lt;/p&gt;

&lt;p&gt;From my own experience, I can say that this is partially true. I enjoy following the development of modern applications, especially in the field of cryptocurrencies, and this principle proves itself time and time again. The problem isn’t that these companies are small, but rather that in many cases there is simply nothing worth taking from them - at least for now. But when the time comes and value appears, it’s often too late to start thinking about protection - the house is empty, and the safe is gone. That’s why I suggest preparing in advance. As the saying goes, &lt;em&gt;fix the roof while the sun is shining&lt;/em&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Risk management in cybersecurity is really about answering three deceptively simple questions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;em&gt;What could go wrong?&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;em&gt;How likely is it to happen?&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;em&gt;How much will it hurt if it does?&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Every organization &lt;em&gt;(from startups to global corporations)&lt;/em&gt; faces risks that could cause financial loss, reputational damage, legal trouble, or even total shutdown. The difference between those that survive and those that don’t often depends on how well they identify and prepare for these risks.&lt;/p&gt;

&lt;p&gt;The primary goal of organizations is to protect assets. An asset is an item perceived as having value to an organization. Assets can be digital or physical.&lt;/p&gt;

&lt;p&gt;Digital assets include personal information such as Social Security numbers, dates of birth, bank account details, and mailing addresses.&lt;br&gt;
Physical assets may seem less &lt;em&gt;&lt;strong&gt;“cyber”&lt;/strong&gt;&lt;/em&gt;, but are just as critical — if someone can walk into your server room, they don’t need to hack anything. Examples include payment kiosks, servers, computers, and office spaces.&lt;/p&gt;

&lt;p&gt;In the context of risk management, two terms often come up:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;PII (Personally Identifiable Information)&lt;/strong&gt; - data that can be used to identify a specific person. This includes names, addresses, phone numbers, email addresses, and account usernames.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SPII (Sensitive Personally Identifiable Information)&lt;/strong&gt; - a more sensitive subset of PII. This includes information like Social Security numbers, biometric data, medical history, financial account numbers, or any data that could cause significant harm, identity theft, or fraud if exposed.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Whether you’re handling a customer’s shipping address or their passport number, understanding the value and sensitivity of the data is the first step toward protecting it - and toward making smart risk management decisions.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Managing risks isn’t about building an impenetrable fortress. It’s about knowing which battles to fight, which to avoid, and which to insure against - before the attackers make the choice for you.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What's really important?
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;Risk management isn’t a spreadsheet exercise - it’s detective work. You collect evidence about where problems might occur, who might try to cause them, and how bad the consequences would be if they succeeded.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Cybersecurity risk management is a structured process found in global frameworks like &lt;em&gt;&lt;strong&gt;NIST Risk Management Framework&lt;/strong&gt;&lt;/em&gt;, &lt;em&gt;&lt;strong&gt;ISO/IEC 27005&lt;/strong&gt;&lt;/em&gt;, and &lt;em&gt;&lt;strong&gt;CIS Risk Assessment Method&lt;/strong&gt;&lt;/em&gt;. These frameworks all boil down to one simple truth: you can’t protect everything equally, so you need to know what’s worth protecting most, what’s threatening it, and how to act before trouble strikes. &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Also, in regulated industries, additional standards apply - for example, &lt;em&gt;&lt;strong&gt;HIPAA in U.S. healthcare&lt;/strong&gt;&lt;/em&gt;, which mandates risk assessments to protect patient data. &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;At the core, there are five key steps that repeat in a continuous cycle:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;em&gt;&lt;strong&gt;Identify what matters most&lt;/strong&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;strong&gt;Identify who or what can harm it&lt;/strong&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;strong&gt;Find the weaknesses they could exploit&lt;/strong&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;strong&gt;Evaluate how bad and how likely each risk is&lt;/strong&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;strong&gt;Decide what to do about each risk&lt;/strong&gt;&lt;/em&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This isn’t theory - it’s the same structure Fortune 500 companies use, scaled down or up depending on the organization. Let’s break each step down.&lt;/p&gt;

&lt;h3&gt;
  
  
  Step 1 - Identify what matters most
&lt;/h3&gt;

&lt;p&gt;Before you can protect anything, you need to know what’s worth protecting. In risk management, these are your critical assets:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Customer databases with personal data&lt;/li&gt;
&lt;li&gt;Financial systems and transaction platforms&lt;/li&gt;
&lt;li&gt;Proprietary designs, formulas, or source code&lt;/li&gt;
&lt;li&gt;Critical infrastructure (servers, cloud services, network equipment)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;/em&gt; A SaaS company might identify its cloud-hosted application and customer records as top-priority assets because downtime or breach would lead to both massive financial loss and reputational damage.&lt;/p&gt;

&lt;h3&gt;
  
  
  Step 2 - Identify who or what can harm it
&lt;/h3&gt;

&lt;p&gt;Threats can come from outside or inside:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;External: cybercriminal gangs, hacktivists, state-sponsored groups, competitors&lt;/li&gt;
&lt;li&gt;Internal: disgruntled employees, accidental mistakes, misconfigurations
Environmental/technical: power outages, hardware failures, natural disasters&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;/em&gt; For an online retailer, a likely threat could be credential-stuffing attacks by bots using stolen passwords from other breaches.&lt;/p&gt;

&lt;h3&gt;
  
  
  Step 3 - Find the weaknesses they could exploit
&lt;/h3&gt;

&lt;p&gt;Every system has vulnerabilities - flaws that can be exploited. Common ones include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Outdated software with known exploits&lt;/li&gt;
&lt;li&gt;Weak or reused passwords&lt;/li&gt;
&lt;li&gt;Poor network segmentation&lt;/li&gt;
&lt;li&gt;Misconfigured cloud storage&lt;/li&gt;
&lt;li&gt;Unpatched IoT devices&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Tools like vulnerability scanners, penetration tests, and configuration audits help find them.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;/em&gt; A healthcare provider’s security team discovers an internet-facing medical records portal running outdated software vulnerable to SQL injection attacks.&lt;/p&gt;

&lt;h3&gt;
  
  
  Step 4 - Evaluate how bad and how likely each risk is
&lt;/h3&gt;

&lt;p&gt;Not all risks are equal. You need to consider:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Likelihood - how probable is the event?&lt;/li&gt;
&lt;li&gt;Impact - what’s the scale of damage if it happens?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You can do this qualitatively (&lt;em&gt;low/medium/high&lt;/em&gt;), quantitatively (&lt;em&gt;financial values, probability percentages&lt;/em&gt;), or a mix. Many use a risk heat map to visualize priority.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;/em&gt; A phishing attack might be very likely but low-impact if you have strong detection and quick response, while a ransomware breach on critical servers might be rare but catastrophic.&lt;/p&gt;

&lt;h3&gt;
  
  
  Step 5 - Decide what to do about each risk
&lt;/h3&gt;

&lt;p&gt;You have four basic options:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Avoid&lt;/strong&gt; - eliminate the risk source&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Reduce&lt;/strong&gt; - add protections to lower the chance or impact&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Transfer&lt;/strong&gt; - shift responsibility&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Accept&lt;/strong&gt; - consciously live with the risk if it’s low enough&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;/em&gt; A small business might choose to avoid the risk of hosting its own email server by moving to a managed service with built-in security.&lt;/p&gt;

&lt;p&gt;Cybersecurity risk management isn’t about chasing every possible threat, but it’s about clarity and focus. The five steps give you a repeatable, structured way to move from uncertainty (&lt;em&gt;&lt;strong&gt;we don’t know where we’re vulnerable&lt;/strong&gt;&lt;/em&gt;) to informed action (&lt;em&gt;&lt;strong&gt;we know our critical risks and how we’re handling them&lt;/strong&gt;&lt;/em&gt;).&lt;/p&gt;

&lt;p&gt;Whether you’re a startup founder or part of a global security team, this process scales. It forces you to prioritize, to think like an attacker, and to make conscious decisions before an incident makes them for you.&lt;/p&gt;

&lt;p&gt;In the next section, we’ll explore exactly how to reduce those prioritized risks - and how to choose the right strategy for each one.&lt;/p&gt;

&lt;h2&gt;
  
  
  Reduce Risks
&lt;/h2&gt;

&lt;p&gt;In every recognized risk management framework - such us &lt;em&gt;&lt;strong&gt;NIST&lt;/strong&gt;&lt;/em&gt; to &lt;em&gt;&lt;strong&gt;ISO/IEC 27005&lt;/strong&gt;&lt;/em&gt; or &lt;em&gt;&lt;strong&gt;CIS RAM&lt;/strong&gt;&lt;/em&gt; - the same truth emerges: when you strip away the details, there are only four possible ways to respond to a risk.&lt;/p&gt;

&lt;p&gt;Why? Because any action you take will ultimately fit into one of these categories:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;You remove the risk completely → Avoidance&lt;/li&gt;
&lt;li&gt;You make it smaller by adding defenses → Reduction&lt;/li&gt;
&lt;li&gt;You hand it off to someone else to handle → Transfer&lt;/li&gt;
&lt;li&gt;You live with it after making a conscious choice → Acceptance&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is true whether the risk is financial, operational, or cybersecurity-related. More &lt;em&gt;&lt;strong&gt;“options”&lt;/strong&gt;&lt;/em&gt; you might hear - like mitigation, sharing, or outsourcing - are actually just variations or combinations of these four fundamentals.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why four is enough&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Logical completeness - these cover all possible actions you can take toward a risk.&lt;/li&gt;
&lt;li&gt;Clarity - having just four categories avoids decision paralysis.&lt;/li&gt;
&lt;li&gt;Scalability - works for a small business, a Fortune 500, or even national-level security.&lt;/li&gt;
&lt;li&gt;Alignment - since global standards agree on these four, using them keeps your approach consistent with industry best practice.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Think of them as the four cardinal directions in navigation - you can go northeast if you want, but it’s still a mix of north and east.&lt;/p&gt;

&lt;h3&gt;
  
  
  Avoid the Risk
&lt;/h3&gt;

&lt;p&gt;Eliminate the source of the risk entirely.&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;/em&gt; If a legacy on-premise email server is riddled with vulnerabilities and costly to maintain, you might shut it down and move to a secure cloud provider.&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Best for&lt;/strong&gt;&lt;/em&gt;: High-risk systems that you don’t critically need or can easily replace.&lt;/p&gt;

&lt;h3&gt;
  
  
  Reduce the Risk
&lt;/h3&gt;

&lt;p&gt;Put in controls to lower the likelihood or impact.&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;/em&gt; Implementing multi-factor authentication (MFA) to reduce the risk of account compromise from stolen passwords.&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Best for:&lt;/strong&gt;&lt;/em&gt; Risks that can’t be avoided but can be significantly minimized.&lt;/p&gt;

&lt;h3&gt;
  
  
  Transfer the Risk
&lt;/h3&gt;

&lt;p&gt;Shift the financial or operational impact to a third party.&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;/em&gt; Purchasing cyber insurance to cover costs from a ransomware attack.&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Best for:&lt;/strong&gt;&lt;/em&gt; Risks that are difficult to reduce internally or require specialized expertise.&lt;/p&gt;

&lt;h3&gt;
  
  
  Accept the Risk
&lt;/h3&gt;

&lt;p&gt;Make an informed decision to live with it.&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;/em&gt; A small startup decides not to invest in enterprise-grade DDoS protection because the likelihood and impact are both low.&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Best for:&lt;/strong&gt;&lt;/em&gt; Low-likelihood, low-impact risks where mitigation is not cost-effective.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;A single risk may require a combination of strategies. For example, you could reduce the chance of a phishing attack with employee training, transfer some financial exposure via insurance, and accept the residual risk.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Framework(s)?
&lt;/h2&gt;

&lt;p&gt;In previous articles, you’ve already encountered security frameworks. Now, it’s time to see how they work in practice for risk management. &lt;/p&gt;

&lt;p&gt;One of the most respected in the field is the NIST Risk Management Framework (RMF), developed by the U.S. National Institute of Standards and Technology. While originally designed for U.S. federal agencies, it’s now used globally by organizations of all sizes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The RMF provides a structured, repeatable process for identifying, evaluating, and responding to risks in a way that aligns with business objectives and compliance requirements&lt;/strong&gt;. It ensures that security isn’t just a technical checklist, but a strategic decision-making process.&lt;/p&gt;

&lt;h3&gt;
  
  
  7 Steps of the NIST RMF
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Prepare&lt;/strong&gt; - Understand the mission, context, stakeholders, and risk tolerance of your organization.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Categorize&lt;/strong&gt; - Classify information systems based on the potential impact of a breach or compromise.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Select&lt;/strong&gt; - Choose security controls proportionate to the risk level and system classification.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Implement&lt;/strong&gt; - Put the chosen controls into operation, integrating them into processes and systems.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Assess&lt;/strong&gt; - Test and verify that the controls work as intended.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Authorize&lt;/strong&gt; - Grant formal approval for the system to operate based on residual risk.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Monitor&lt;/strong&gt; - Continuously track changes, emerging threats, and system performance to adjust controls.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The RMF naturally guides you toward one of the four risk response strategies we discussed earlier:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;If a system is too risky and cannot be secured → Avoid&lt;/li&gt;
&lt;li&gt;If a risk can be brought down to an acceptable level → Reduce&lt;/li&gt;
&lt;li&gt;If another party can handle it more effectively → Transfer&lt;/li&gt;
&lt;li&gt;If the residual risk is acceptable within business tolerance → Accept&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;A framework like NIST RMF removes guesswork. It gives you a shared language, a clear process, and a proven foundation for deciding which risks to tackle, which to hand off, and which to live with.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;&lt;strong&gt;Even the most fortified castle can fall - history has proven it time and again.&lt;/strong&gt;&lt;/em&gt; In cybersecurity, the same rule applies: no system is invincible. That’s why smart organizations don’t chase “perfect” security - they manage risks so that one breach doesn’t become a catastrophe. It’s about knowing which defenses matter most, preparing for the attacks you can’t prevent, and building resilience to recover faster than the damage spreads. Less glamorous than an impenetrable wall, yes - but far more effective. &lt;em&gt;&lt;strong&gt;In the end, the goal isn’t to be untouchable; it’s to ensure that when the walls are tested, your company is still standing the next day.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>beginners</category>
      <category>theory</category>
    </item>
    <item>
      <title>Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)</title>
      <dc:creator>Dzmitry Harbachou</dc:creator>
      <pubDate>Wed, 13 Aug 2025 15:48:00 +0000</pubDate>
      <link>https://dev.to/dharbachou/boring-cybersecurity-theory-threats-40d3</link>
      <guid>https://dev.to/dharbachou/boring-cybersecurity-theory-threats-40d3</guid>
      <description>&lt;p&gt;We’ve already been introduced to the key actors in the cybersecurity landscape - such as hackers, cyber activists, and other threat agents - and we understand the goals they may pursue and the capabilities they possess. Now, it’s time to examine the methods they use and the steps they take to achieve their objectives.&lt;/p&gt;

&lt;p&gt;In this article, we will explore the fundamental concepts of cybersecurity, including threats, vulnerabilities, attacks, and malware. We will look at how these elements are interconnected, the different forms they can take, and why understanding them is essential for building effective security strategies.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Cybersecurity is a field of technology focused on protecting computers, mobile devices, and digital information from malicious actors seeking unauthorized access or intending to cause harm. Individuals, businesses, and governments increasingly store sensitive data - such as credit card numbers, addresses, phone numbers, passwords, personal details, and customer information - on desktops and mobile devices. The primary goal of cybersecurity is to keep that data secure and private. And the best way to ensure effective protection is to understand potential threats in order to prepare for and defend against them.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;The following diagram shows how threats, vulnerabilities, attacks, and malware are interconnected within the cybersecurity landscape.&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Threats - what can happen
      │
     Examples:
      ├── Hackers, cybercrime groups, competitors
      ├── Disgruntled employee, Administrator error
      │
      ▼  
Vulnerability (gaps, are used to get access)
      │
    Examples: 
      ├── Errors in code, configuration, logic
      ├── XSS
      ├── SQLi
      ├── open ports
      ├── weak passwords
      │
      ▼  
Attacks (actions)
      │
    Examples:
      ├── Exploits (Exploit) - code that exploits a vulnerability
      ├── Phishing
      ├── Brute- force / Credential stuffing
      ├── DDoS (Denial of Service)
      │
      ▼  
Malware (weapons)
      │
    Examples:
      ├── Viruses - embed themselves in other files
      ├── Worms - self-propagating
      ├── Trojans - disguise themselves as useful programs
      ├── Rootkits - hide the presence of other threats
      ├── Spyware - spies on the user
      ├── Ransomware - encrypts files, Demands ransom
      └── Backdoors - leaves a “backdoor” for access
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  How it all works together :
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;A threat actor is motivated to gain benefit or cause damage.&lt;/li&gt;
&lt;li&gt;It seeks or discovers a vulnerability - technical, process or social.&lt;/li&gt;
&lt;li&gt;An attack is launched, which may involve several phases 
&lt;strong&gt;(reconnaissance → delivery → exploitation → hardening → targeting)&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;The delivery/exploitation phase often utilizes malware as a means of penetration, withholding access, or extending influence.&lt;/li&gt;
&lt;li&gt;If the attack is successful, risk is realized: data compromise, downtime, financial loss, reputational damage, etc.&lt;/li&gt;
&lt;/ol&gt;




&lt;p&gt;There is plenty of information here, and instead of inventing a florid presentation, I suggest not wasting time - let's just dive into the facts. Let's read!&lt;/p&gt;

&lt;h2&gt;
  
  
  Threats
&lt;/h2&gt;

&lt;p&gt;Threats in cybersecurity refer to any potential danger that could exploit a vulnerability and cause harm to a system, network, or data. These threats can come from various sources - including malicious individuals, software bugs, or natural disasters - and can lead to data breaches, service disruptions, or unauthorized access.&lt;/p&gt;

&lt;p&gt;Below are several common classifications of threats used to better understand and address them.&lt;/p&gt;

&lt;h3&gt;
  
  
  By source
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;External: cybercriminals, governments, partners/contractors.&lt;/li&gt;
&lt;li&gt;Internal (insider): employees, admins, contractors with access.&lt;/li&gt;
&lt;li&gt;Natural/technogenic: fire, flooding, power failure, data center failure.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  By actor (threat actors)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;State APT groups (cyber espionage, sabotage).&lt;/li&gt;
&lt;li&gt;Cybercriminals (financial motivation, extortion).&lt;/li&gt;
&lt;li&gt;Hacktivists (ideology/protest).&lt;/li&gt;
&lt;li&gt;Competitors (corporate espionage).&lt;/li&gt;
&lt;li&gt;Script-kiddies (use off-the-shelf exploits without in-depth knowledge).&lt;/li&gt;
&lt;li&gt;Internal attackers (intentional) and unintentional insiders (mistakes, negligence).&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  By attack vector
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Networked: DDoS, MITM, service scanning and exploitation.&lt;/li&gt;
&lt;li&gt;Application (AppSec): SQLi, XSS, RCE, SSRF, deserialization.&lt;/li&gt;
&lt;li&gt;Social engineering: phishing, spear-phishing, vishing, BEC.&lt;/li&gt;
&lt;li&gt;Supply-chain (through supply chain/libraries/partners).&lt;/li&gt;
&lt;li&gt;Physical access: device theft, hardware tampering.&lt;/li&gt;
&lt;li&gt;Cloud/configuration: public S3 bundles, excessive IAM privileges.&lt;/li&gt;
&lt;li&gt;IoT/OT/SCADA: attacks on industrial controllers, smart devices.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  By target/impact (CIA-triad + other)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Breach of confidentiality: data leakage, exfiltration.&lt;/li&gt;
&lt;li&gt;Integrity breach: data spoofing/modification, sabotage.&lt;/li&gt;
&lt;li&gt;Availability breach: DDoS, encryptors (ransomware).&lt;/li&gt;
&lt;li&gt;Breach of trust/reputation, fraud, financial loss.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  By motivation
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Financial gain (ransomware, banking trojans, cryptomining).&lt;/li&gt;
&lt;li&gt;Espionage (cyber espionage, intellectual property theft).&lt;/li&gt;
&lt;li&gt;Sabotage/destruction (disabling IT/OT systems).&lt;/li&gt;
&lt;li&gt;Activism/ideology.&lt;/li&gt;
&lt;li&gt;Reconnaissance/network movement (for future operations).&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  By complexity and duration
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Opportunistic (mass, automated, no targeting).&lt;/li&gt;
&lt;li&gt;Targeted (targeted).&lt;/li&gt;
&lt;li&gt;APT (Advanced Persistent Threat) - lengthy, resource-intensive, with TTP by MITRE ATT&amp;amp;CK.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  By environment/technology
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Clouds (IaaS/PaaS/SaaS).&lt;/li&gt;
&lt;li&gt;Mobile devices.&lt;/li&gt;
&lt;li&gt;IoT / IIoT.&lt;/li&gt;
&lt;li&gt;OT/ICS (industry, energy).&lt;/li&gt;
&lt;li&gt;AI/ML-centric threats (data poisoning, model stealing, deepfakes).&lt;/li&gt;
&lt;li&gt;Crypto/blockchain ecosystem (compromise of smart contracts, bridges, wallets).&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Vulnerabilities
&lt;/h2&gt;

&lt;p&gt;Cybersecurity professionals spend much of their time chasing weaknesses - patching unpatched systems, reconfiguring misconfigured clouds, training distracted users. All of these weaknesses share one name: &lt;strong&gt;&lt;em&gt;vulnerabilities&lt;/em&gt;&lt;/strong&gt;. But not all vulnerabilities are created equal. This article maps the landscape so you can identify, prioritize, and ultimately eliminate the cracks before an adversary slips through.&lt;/p&gt;

&lt;p&gt;A vulnerability is a key point of interest for both hackers and cybersecurity professionals. It’s a weakness in a system that can be exploited to gain unauthorized access or cause damage. In ancient times, it would be like an open gate in a city wall - if the gate is left open and the guards are asleep, invaders can raid the city with ease… and might even leave a thank-you note for the hospitable hosts on their way out. That’s why identifying and securing vulnerabilities lies at the heart of any effective cybersecurity strategy.&lt;/p&gt;

&lt;h3&gt;
  
  
  Where Do Vulnerabilities Come From?
&lt;/h3&gt;

&lt;p&gt;Vulnerabilities in cybersecurity can stem from a variety of sources. Understanding where they come from is essential for identifying and addressing them effectively. Below are the four most common origins of vulnerabilities, along with real-world examples that highlight how they manifest in practice.&lt;/p&gt;

&lt;h4&gt;
  
  
  1. Software Flaws
&lt;/h4&gt;

&lt;p&gt;One of the most common sources of vulnerabilities is flawed or poorly written code. These can result from bugs, design oversights, or a failure to account for edge cases during development. Classic examples include buffer overflows in C-based applications, SQL injection vulnerabilities in login forms, and unsafe object deserialization in web services. Even a single overlooked line of code can open the door for serious security breaches.&lt;/p&gt;

&lt;h4&gt;
  
  
  2. Hardware Flaws
&lt;/h4&gt;

&lt;p&gt;Sometimes the vulnerabilities lie deeper - within the hardware itself. Defects in CPUs, firmware, or devices can lead to serious exploits that are difficult to patch or detect. Notable examples include the Spectre and Meltdown side-channel attacks, which exploited fundamental flaws in modern processors. Other cases include backdoored routers or vulnerable UEFI firmware, which attackers can use to compromise systems at a low level.&lt;/p&gt;

&lt;h4&gt;
  
  
  3. Misconfigurations
&lt;/h4&gt;

&lt;p&gt;Even well-designed systems can be made insecure through misconfiguration. This includes using insecure default settings, failing to restrict access properly, or exposing internal tools to the internet. Examples include publicly accessible Amazon S3 buckets, open FTP or Telnet services, Kubernetes dashboards left unprotected, or applying overly permissive file permissions like chmod 777 on sensitive data.&lt;/p&gt;

&lt;h4&gt;
  
  
  4. Human Factor
&lt;/h4&gt;

&lt;p&gt;Finally, humans are often the weakest link in the security chain. Whether through ignorance, error, or manipulation, people can unintentionally create vulnerabilities. Common examples include reusing passwords across services, leaving test or default accounts active in production environments, or falling victim to phishing emails. Social engineering remains a highly effective tactic for attackers precisely because it targets human behavior rather than technology.&lt;/p&gt;

&lt;h3&gt;
  
  
  Mapping Vulnerabilities Across the Stack
&lt;/h3&gt;

&lt;p&gt;Vulnerabilities can exist at every layer of a system - from physical infrastructure all the way up to application logic. Understanding where these weaknesses occur helps security teams apply defense-in-depth strategies and prioritize remediation efforts. Below is a breakdown of common vulnerability types across different layers of the stack:&lt;/p&gt;

&lt;h4&gt;
  
  
  1. Network Level
&lt;/h4&gt;

&lt;p&gt;At the network layer, poor segmentation or outdated technologies can expose internal systems to external threats. Examples include weak or flat network architecture, legacy VPN protocols that no longer meet modern security standards, and open SMB (Server Message Block) shares accessible without proper restrictions.&lt;/p&gt;

&lt;h4&gt;
  
  
  2. Protocol Level
&lt;/h4&gt;

&lt;p&gt;Vulnerabilities in communication protocols can be exploited to intercept, manipulate, or redirect data. Common issues include SSL/TLS downgrade attacks, DNS cache poisoning, and insecure SMTP relays - all of which can lead to man-in-the-middle attacks or data tampering.&lt;/p&gt;

&lt;h4&gt;
  
  
  3. Application Level
&lt;/h4&gt;

&lt;p&gt;The application layer is one of the most frequently targeted by attackers. Vulnerabilities here include Cross-Site Scripting (XSS), SQL Injection (SQLi), Remote Code Execution (RCE), and broken access control. These flaws can lead to unauthorized data access, service disruption, or full system compromise.&lt;/p&gt;

&lt;h4&gt;
  
  
  4. Operating System Level
&lt;/h4&gt;

&lt;p&gt;When the underlying OS is not properly maintained, it can expose systems to low-level attacks. Examples include outdated kernels lacking security patches, vulnerable device drivers, and the absence of exploit mitigation features like Address Space Layout Randomization (ASLR) or Data Execution Prevention (DEP).&lt;/p&gt;

&lt;h4&gt;
  
  
  5. Physical Level
&lt;/h4&gt;

&lt;p&gt;Even the best digital defenses can be bypassed if physical security is neglected. Unlocked server rooms, unencrypted laptops left unattended, or the use of rogue USB devices can all lead to direct data theft or the installation of persistent malware.&lt;/p&gt;

&lt;h3&gt;
  
  
  How Dangerous Are They? (Severity)
&lt;/h3&gt;

&lt;p&gt;Not all vulnerabilities are created equal. To manage risk effectively, it's essential to classify vulnerabilities by their severity. This helps security teams prioritize which issues to address first, ensuring that the most dangerous threats are mitigated before they can be exploited.&lt;/p&gt;

&lt;p&gt;Here’s a breakdown of common severity levels, the typical impact associated with each, and why they matter in a real-world security context:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;strong&gt;Severity&lt;/strong&gt;&lt;/th&gt;
&lt;th&gt;&lt;strong&gt;Typical Impact&lt;/strong&gt;&lt;/th&gt;
&lt;th&gt;&lt;strong&gt;Why It Matters&lt;/strong&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Critical&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Full system takeover, mass data breach&lt;/td&gt;
&lt;td&gt;Must be patched or mitigated immediately - attackers often automate exploitation.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;High&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Data exfiltration, authentication bypass&lt;/td&gt;
&lt;td&gt;Should be prioritized quickly due to high risk of real-world damage.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Medium&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Denial of Service (DoS), partial compromise&lt;/td&gt;
&lt;td&gt;Can be scheduled for remediation - may be chained with other bugs for escalation.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Low&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Information disclosure, banner grabbing&lt;/td&gt;
&lt;td&gt;Fix during regular patch cycles - valuable for attackers during reconnaissance.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Understanding severity not only helps with technical triage, but also with communicating risk to stakeholders. Critical and high-severity vulnerabilities often require immediate attention, while medium and low-severity issues can be managed over time - though none should be ignored. In cybersecurity, even “low-risk” vulnerabilities can be a foothold for a more serious breach if left unattended.&lt;/p&gt;

&lt;h3&gt;
  
  
  By Exploitation Method
&lt;/h3&gt;

&lt;p&gt;Vulnerabilities can be categorized not only by their severity or stack, but also by how attackers exploit them. Understanding these methods helps prioritize risks and build more effective defenses.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Remote vulnerabilities - no prior access needed (e.g., SQLi, Log4Shell).&lt;/li&gt;
&lt;li&gt;Local vulnerabilities - require foothold first (privilege escalations like Dirty Pipe).&lt;/li&gt;
&lt;li&gt;Logical flaws - business‑logic errors (bypassing payment limits, coupon abuse).&lt;/li&gt;
&lt;li&gt;Zero-days - unknown to the vendor, patch not available; keep multi-layered protection at the ready.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Organizational &amp;amp; Process Vulnerabilities
&lt;/h3&gt;

&lt;p&gt;Technology alone is rarely the root of a breach - it's often weaknesses in processes, policies, and people that create the real risk surface.&lt;/p&gt;

&lt;p&gt;Common organizational vulnerabilities include the absence of a proper patch-management policy, allowing known CVEs to remain unpatched for months. Defensive tools such as antivirus and intrusion detection systems may be in place, but if they're outdated or misconfigured, they fail to detect evolving threats. A lack of security awareness among staff means users continue to fall for phishing emails and open malicious attachments like “invoice.pdf.exe.” And perhaps most critically, without tested and recoverable backups, a ransomware incident can escalate into a full-scale business disaster.&lt;/p&gt;




&lt;p&gt;Vulnerabilities are inevitable, breaches are not. By systematically spotting weaknesses and treating the most dangerous first, you shift the odds dramatically in your favor.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;And, as tradition demands, let’s wrap up with a few infamous security stories - real-world bugs that left scars, headlines, and some valuable lessons.&lt;/p&gt;

&lt;p&gt;😏 &lt;strong&gt;Heartbleed (CVE‑2014‑0160)&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Year: 2014&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
Who knew a harmless-sounding "heartbeat" feature in OpenSSL could end up bleeding encryption keys across the internet? It was just a missing bounds check… and suddenly half the web was exposed. Lesson: never underestimate small bugs in critical libraries.&lt;/p&gt;

&lt;p&gt;😧 &lt;strong&gt;Log4Shell (CVE‑2021‑44228)&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Year: 2021&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
A logging library. That’s all it was. But thanks to some overly “helpful” features in Log4j, attackers could achieve remote code execution by… sending a log string. In short: “If you can log it, you can own it.” Java admins everywhere cried in JSON.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Stay patched, stay paranoid, and keep learning - because the attackers surely are.&lt;/p&gt;

&lt;h2&gt;
  
  
  Attacks
&lt;/h2&gt;

&lt;p&gt;In cybersecurity, an attack is any intentional action designed to exploit a vulnerability in order to gain unauthorized access, disrupt services, or steal data. To defend effectively, it’s crucial to understand not just what attacks look like, but how they work - and why they happen.&lt;/p&gt;

&lt;p&gt;Below is an organized overview of the most common attack types, grouped by attack vector (how they enter), technique (how they operate), and objective (what they aim to achieve). This structure helps teams classify threats, recognize attack patterns early, and prioritize response based on real-world risk.&lt;/p&gt;

&lt;h3&gt;
  
  
  By Point of Entry
&lt;/h3&gt;

&lt;p&gt;To understand how attacks begin, it's helpful to look at their initial point of entry - the place where attackers first interact with a system. Each vector opens a different kind of door, and each demands a tailored defense strategy.&lt;/p&gt;

&lt;p&gt;Here are the most common entry points attackers use:&lt;/p&gt;

&lt;h4&gt;
  
  
  Network
&lt;/h4&gt;

&lt;p&gt;Attackers manipulate network traffic, protocols, or routing mechanisms to disrupt services or intercept communication.&lt;br&gt;
&lt;strong&gt;&lt;em&gt;Typical attacks&lt;/em&gt;&lt;/strong&gt;: DDoS, ARP spoofing, DNS cache poisoning, TCP RST flood.&lt;/p&gt;

&lt;h4&gt;
  
  
  Web Applications
&lt;/h4&gt;

&lt;p&gt;Vulnerabilities in web services are exploited through crafted input or malicious data injection. This is one of the most common and dangerous vectors.&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Typical attacks&lt;/strong&gt;&lt;/em&gt;: SQL injection (SQLi), Cross-Site Scripting (XSS), Server-Side Request Forgery (SSRF), Remote Code Execution via unsafe deserialization.&lt;/p&gt;

&lt;h4&gt;
  
  
  Social Engineering
&lt;/h4&gt;

&lt;p&gt;Here, the attacker targets people, not systems - manipulating users into giving up access, credentials, or performing unsafe actions.&lt;br&gt;
&lt;strong&gt;&lt;em&gt;Typical attacks&lt;/em&gt;&lt;/strong&gt;: phishing, spear-phishing, business email compromise (BEC), voice phishing (vishing), SMS phishing (smishing).&lt;/p&gt;

&lt;h4&gt;
  
  
  Supply Chain
&lt;/h4&gt;

&lt;p&gt;By compromising a trusted third-party component, attackers gain indirect access to a target system - often going unnoticed.&lt;br&gt;
&lt;strong&gt;&lt;em&gt;Typical attacks&lt;/em&gt;&lt;/strong&gt;: malicious package updates (e.g. NPM), SolarWinds-style backdoors in software build pipelines.&lt;/p&gt;

&lt;h4&gt;
  
  
  Physical Access
&lt;/h4&gt;

&lt;p&gt;Sometimes attackers go beyond the digital layer and gain direct access to devices or environments.&lt;br&gt;
&lt;strong&gt;&lt;em&gt;Typical attacks&lt;/em&gt;&lt;/strong&gt;: rogue USB drives, hardware keyloggers, Evil Twin Wi‑Fi access points.&lt;/p&gt;

&lt;h4&gt;
  
  
  Cloud / SaaS
&lt;/h4&gt;

&lt;p&gt;Misconfigured cloud environments or weak identity policies can be an open door to sensitive resources.&lt;br&gt;
&lt;strong&gt;&lt;em&gt;Typical attacks&lt;/em&gt;&lt;/strong&gt;: stolen OpenID Connect (OIDC) tokens, exposed AWS S3 keys, missing multi-factor authentication (MFA) in Azure AD.&lt;/p&gt;

&lt;h4&gt;
  
  
  IoT / OT / SCADA Systems
&lt;/h4&gt;

&lt;p&gt;Industrial controllers and smart devices are often insecure by design — and hard to patch.&lt;br&gt;
&lt;strong&gt;&lt;em&gt;Typical attacks&lt;/em&gt;&lt;/strong&gt;: logic manipulation in PLCs, IoT botnets like Mirai targeting smart cameras and routers.&lt;/p&gt;

&lt;p&gt;Understanding the entry point is the first step in anticipating how an attack may unfold - and in designing defenses that block threats before they take hold.&lt;/p&gt;

&lt;h3&gt;
  
  
  By Mode of Impact
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Passive - Eavesdropping, scanning, OSINT; observes without modifying data or systems.&lt;/li&gt;
&lt;li&gt;Active - Injections, remote code execution (RCE), ransomware; alters system state or breaks confidentiality, integrity, or availability.&lt;/li&gt;
&lt;li&gt;Combined - Starts with silent reconnaissance, followed by active exploitation; common in advanced persistent threats (APTs).&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Popular Attack Techniques (TTPs)
&lt;/h3&gt;

&lt;p&gt;Attackers rely on a wide range of Tactics, Techniques, and Procedures (TTPs) to achieve their objectives. Below are the most common categories and what they typically involve:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Credential Attacks - Brute force, credential stuffing, pass-the-hash, password spraying.
&lt;em&gt;Often use leaked password dumps or weak login policies.&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Injection Attacks - SQL, LDAP, OS command injection, XXE, NoSQL injection.
&lt;em&gt;Prevented through input validation and secure coding practices.&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Memory Exploitation - Buffer overflows, use-after-free, integer overflows.
&lt;em&gt;Common in low-level languages like C/C++.&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Man-in-the-Middle (MitM) - ARP poisoning, SSL stripping, session hijacking.
&lt;em&gt;Modern protocols like TLS 1.3 and HSTS help reduce the risk.&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Malware-Based Attacks - Ransomware, Trojans, worms, crypto-miners, RATs.
&lt;em&gt;Delivered via phishing emails, drive-by downloads, or malicious ads.&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Denial-of-Service (DoS) - DNS/UDP floods, SYN floods, Slowloris-style attacks.
&lt;em&gt;Often launched by botnets to overwhelm services.&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Privilege Escalation - Kernel exploits (e.g., Dirty Pipe), misconfigured SUID, cloud metadata abuse.
&lt;em&gt;Used to gain admin or root access.&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Evasion and Obfuscation - Fileless malware (PowerShell, WMI), packed binaries.
&lt;em&gt;Designed to bypass antivirus and endpoint protection.&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Data Exfiltration - DNS tunneling, steganography, abuse of cloud sync services.
&lt;em&gt;Makes stolen data appear as regular outbound traffic.&lt;/em&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  A Step‑by‑Step Attack: The MITRE ATT&amp;amp;CK Kill Chain
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Reconnaissance - OSINT collection, port scanning.&lt;/li&gt;
&lt;li&gt;Initial Access - Phishing email delivers dropper.&lt;/li&gt;
&lt;li&gt;Execution - Payload runs via PowerShell.&lt;/li&gt;
&lt;li&gt;Persistence - Adds autorun key in Registry.&lt;/li&gt;
&lt;li&gt;Privilege Escalation - Kernel exploit used for admin rights.&lt;/li&gt;
&lt;li&gt;Defense Evasion - Disables antivirus/EDR tools.&lt;/li&gt;
&lt;li&gt;Credential Access - Extracts passwords from LSASS memory.&lt;/li&gt;
&lt;li&gt;Lateral Movement - Pass-the-Hash to move within Active Directory.&lt;/li&gt;
&lt;li&gt;Collection - Archives sensitive documents.&lt;/li&gt;
&lt;li&gt;Exfiltration - Sends data via HTTPS to attacker-controlled cloud.&lt;/li&gt;
&lt;li&gt;Impact - Launches ransomware and encrypts files.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Attacks by Goal (CIA + E)
&lt;/h3&gt;

&lt;p&gt;Attacks often target one or more of the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Confidentiality - Sniffing, SQL dumps, phishing.
&lt;em&gt;Result: Data breaches, regulatory fines.&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Integrity - Web defacement, data tampering (e.g., IoT sensors).
&lt;em&gt;Result: Operational disruption, misleading metrics.&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Availability - DDoS, ransomware, database destruction.
&lt;em&gt;Result: Downtime, reputational damage.&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Economics / Reputation - Business Email Compromise (BEC), CEO fraud, insider trading.
&lt;em&gt;Result: Financial loss, stock price drops.&lt;/em&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  How to Defend (Quick Guide)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Layered security - Network segmentation, Zero Trust, WAF, EDR, SIEM.&lt;/li&gt;
&lt;li&gt;Patch management - Prioritize by CVSS scores and real-world exploitability.&lt;/li&gt;
&lt;li&gt;Secure development - Use SDLC practices, SAST/DAST, and threat modeling.&lt;/li&gt;
&lt;li&gt;User awareness - Regular phishing simulations and security training.&lt;/li&gt;
&lt;li&gt;Backups &amp;amp; Disaster Recovery - Keep offline, off-site, and test them regularly.&lt;/li&gt;
&lt;li&gt;Threat intelligence - Track IOCs, follow TTP trends, and map to MITRE ATT&amp;amp;CK.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;An attack is rarely a single event - it’s a chain of methods and tools. Break that chain early, and most threats will remain nothing more than lines in an analyst’s report.&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Malware
&lt;/h2&gt;

&lt;p&gt;Malware is a broad term for any malicious code designed to disrupt systems, steal data, or gain unauthorized access. Despite decades of evolution, it remains one of the top cyber threats. Below is a practitioner-focused breakdown of today’s malware landscape.&lt;/p&gt;

&lt;h3&gt;
  
  
  By Primary Function (Payload)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Virus - Injects itself into files to spread.
&lt;em&gt;Examples: ILOVEYOU, Michelangelo.&lt;/em&gt; Rare today; mostly blocked by modern EDRs.&lt;/li&gt;
&lt;li&gt;Worm - Spreads automatically over networks.
&lt;em&gt;Examples: Conficker, WannaCry.&lt;/em&gt; Recently resurged via AI-crafted SMB exploits.&lt;/li&gt;
&lt;li&gt;Ransomware - Encrypts data for ransom.
&lt;em&gt;Examples: LockBit, BlackCat.&lt;/em&gt; Now with “triple extortion” (encryption + leak + DDoS).&lt;/li&gt;
&lt;li&gt;Spyware/Infostealer - Steals credentials and session data.
&lt;em&gt;Examples: AgentTesla, RedLine.&lt;/em&gt; New stealers target browsers and MFA tokens.&lt;/li&gt;
&lt;li&gt;Trojan - Masquerades as legitimate software.
&lt;em&gt;Example: Emotet.&lt;/em&gt; Often the first stage in multi-phase attacks.&lt;/li&gt;
&lt;li&gt;Rootkit/Bootkit - Hides deep in the system or firmware.
&lt;em&gt;Examples: TDL-4, LoJax.&lt;/em&gt; UEFI implants require firmware-level validation to detect.&lt;/li&gt;
&lt;li&gt;Wiper - Destroys data permanently.
&lt;em&gt;Examples: Shamoon, NotPetya.&lt;/em&gt; Often seen in geopolitically motivated attacks.&lt;/li&gt;
&lt;li&gt;Cryptominer - Hijacks system resources to mine crypto.
&lt;em&gt;Example: XMRig variants.&lt;/em&gt; Containerized environments are common targets.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  By Infection Vector
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Email &amp;amp; Phishing - Office macros, ISO/LNK droppers.&lt;/li&gt;
&lt;li&gt;Drive-by Download - Malicious ads or compromised websites.&lt;/li&gt;
&lt;li&gt;Supply Chain - Poisoned libraries (NPM/PyPI), trojanized updates.&lt;/li&gt;
&lt;li&gt;Removable Media - USB tools, AutoRun exploits (still seen in OT).&lt;/li&gt;
&lt;li&gt;Remote Exploits - VPN, RDP, Confluence, Ivanti zero-days.&lt;/li&gt;
&lt;li&gt;Lateral Movement Tools - PSExec, WMI, remote PowerShell.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  By Stealth &amp;amp; Persistence
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Fileless/Living off the Land - PowerShell, WMI, LOLBins.
&lt;em&gt;Hard to detect - relies on memory for execution.&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;File-based - Executables, scheduled tasks, registry keys.
&lt;em&gt;Moderate detection - caught by signatures + heuristics.&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Firmware/UEFI/BMC - Malware in motherboard or controller firmware.
&lt;em&gt;Highly stealthy - requires chip-level attestation.&lt;/em&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  By Target Platform
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Windows - Still the #1 target for ransomware and loaders.&lt;/li&gt;
&lt;li&gt;Linux/Containers - Cryptominers, botnets (Kaiji, Kinsing).&lt;/li&gt;
&lt;li&gt;macOS - RATs and adware using notarization loopholes.&lt;/li&gt;
&lt;li&gt;Android/iOS - Banking trojans (Anatsa), spyware (Pegasus).&lt;/li&gt;
&lt;li&gt;IoT/OT - Mirai variants, ICS wipers.&lt;/li&gt;
&lt;li&gt;Cloud/SaaS - OAuth token theft, misconfigured access scopes.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  The Malware Kill Chain (Example)
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Initial Access - Phishing email with dropper attachment.&lt;/li&gt;
&lt;li&gt;Execution - Macro runs PowerShell loader.&lt;/li&gt;
&lt;li&gt;Command &amp;amp; Control - Connects to C2 via DNS-over-HTTPS.&lt;/li&gt;
&lt;li&gt;Privilege Escalation - Exploits kernel bug (e.g. Dirty Pipe).&lt;/li&gt;
&lt;li&gt;Lateral Movement - RDP/AD enumeration across network.&lt;/li&gt;
&lt;li&gt;Action on Objectives - Deploys ransomware, exfiltrates data.&lt;/li&gt;
&lt;/ol&gt;

&lt;blockquote&gt;
&lt;p&gt;Break any one of these steps - and the entire attack can fail.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;p&gt;Malware keeps evolving - fileless payloads, Rust-based binaries, firmware-level persistence - but the same weaknesses remain: users click, systems stay unpatched, and misconfigurations persist.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Shrink your attack surface. Assume compromise. Monitor everything. Back up often.&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Stay patched. Stay paranoid. And may your backups never be needed.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Comparison to reality
&lt;/h2&gt;

&lt;p&gt;Sometimes the abstract concepts of cybersecurity become clearer when compared to everyday scenarios. Let’s imagine your system is a house - how would typical security elements translate?&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Category&lt;/th&gt;
&lt;th&gt;Examples&lt;/th&gt;
&lt;th&gt;Figurative comparison&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Threat&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Attacker wants to steal data&lt;/td&gt;
&lt;td&gt;Burglar in the neighborhood&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Vulnerability&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Program with a bug (e.g. SQLi)&lt;/td&gt;
&lt;td&gt;Window that was forgotten to close&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Attack&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;SQL injection, phishing, DDoS&lt;/td&gt;
&lt;td&gt;Robber action&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Malware&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Trojan, virus, spy, ransomware&lt;/td&gt;
&lt;td&gt;Theft tool (lockpick)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;&lt;strong&gt;Every cyberattack begins with a motive&lt;/strong&gt; - the attacker wants something: money, data, disruption. That’s the threat. To act on that motive, they search for weak spots - vulnerabilities - like an unpatched server or misconfigured access. Once they find one, they launch an attack, often using malware as a tool to gain entry, stay hidden, or cause damage.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Cybersecurity isn’t just about firewalls and antivirus - it’s about thinking like a defender and detective in a world full of burglars, windows, and lockpicks.&lt;br&gt;
Understanding how attackers think is the first step toward making your home or system invulnerable.&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>cybersecurity</category>
      <category>beginners</category>
      <category>theory</category>
      <category>security</category>
    </item>
    <item>
      <title>Boring Cybersecurity Theory: Hats (Understand Attackers)</title>
      <dc:creator>Dzmitry Harbachou</dc:creator>
      <pubDate>Wed, 13 Aug 2025 15:44:56 +0000</pubDate>
      <link>https://dev.to/dharbachou/boring-cybersecurity-theory-hats-nderstand-attackers-ek</link>
      <guid>https://dev.to/dharbachou/boring-cybersecurity-theory-hats-nderstand-attackers-ek</guid>
      <description>&lt;p&gt;Earlier, if you read the first article, you were introduced to funny stories about young hackers and the epic failures of major corporations. Now it's time to dive deeper into the world of hackers. But in the professional field, a more generalized term is used &lt;em&gt;&lt;strong&gt;threat actor&lt;/strong&gt;&lt;/em&gt; - because it’s not always someone hacking you through your home internet. Threats can come from colleagues, activists, or just someone bored enough to mess around - and accidentally cause hundreds of thousands of dollars in damage. &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"Life is life" - a phrase my teacher likes to repeat.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;p&gt;The &lt;strong&gt;threat actor is any person or group of people who presents a security risk&lt;/strong&gt;. In this reading, you’ll learn about different types of threat actors. You will also learn about their motivations, intentions, and how they influence the security industry.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;To defend effectively, you need to understand who you're defending against and what their goals are. In some cases you can anticipate the actor's behavior and build a defense, in others - for example, when you are facing a monkey with a grenade - you can only minimize the risks and hope for a miracle.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnjau14icntvn8tlevibb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnjau14icntvn8tlevibb.png" alt="Internal and External Threat Actors" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Internal &lt;strong&gt;VS&lt;/strong&gt; External Threat Actors
&lt;/h2&gt;

&lt;p&gt;When people hear the word hacker, they often imagine an external threat - a teenager in a hoodie breaking into corporate databases and transferring money to an offshore account. While this exaggerated image has become a popular stereotype, it highlights a common misconception: the belief that all cyber threats come from outside an organization. In reality, threats can originate both externally and internally, and overlooking the risks posed by insiders can leave critical vulnerabilities unaddressed.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;"There is no worse enemy than a foolish ally."&lt;/strong&gt;&lt;br&gt;
In 2025, UK logistics company KNP (est. 1867) shut down after a ransomware attack. The breach? Hackers guessed a weak employee password, encrypted systems, and wrecked backups. Despite having cyber insurance, the company couldn’t recover - 700 people lost their jobs. A century-and-a-half-old business was brought down not by elite hackers, but by the digital equivalent of leaving a castle gate made of wet cardboard.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Internal Threat Actors
&lt;/h3&gt;

&lt;p&gt;Internal threat actors are individuals who have legitimate access to an organization’s systems, networks, or data. This includes employees, contractors, suppliers, or any other party with trusted access. Their actions can be both intentional - for example, stealing confidential information or sabotaging systems - or unintentional, such as making mistakes that open security gaps. The key characteristic of an internal threat actor is that they operate from within, often leveraging privileges that bypass many standard security measures.&lt;/p&gt;

&lt;h3&gt;
  
  
  External Threat Actors
&lt;/h3&gt;

&lt;p&gt;External threat actors are individuals or groups outside of an organization who attempt to gain unauthorized access to its systems or data. These can include cybercriminals, state-sponsored attackers, hacktivists, or opportunistic hackers. Unlike insiders, external actors must find ways to penetrate security barriers, often using methods like phishing, malware, brute force attacks, or exploiting software vulnerabilities. They are typically motivated by financial gain, political agendas, espionage, or the challenge of breaking into secure systems.&lt;/p&gt;

&lt;p&gt;In this article, I'd like to focus on a few specific types of threat actors:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Hackers&lt;/strong&gt; - a seemingly straightforward category, but in reality, their motives and methods are far more complex.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Activists&lt;/strong&gt; - a group that’s always relevant, though often misunderstood.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;&lt;strong&gt;Script Kiddies&lt;/strong&gt;&lt;/em&gt; - once seen as harmless amateurs, but with the rise of AI tools, they’re becoming increasingly relevant and dangerous.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Hackers
&lt;/h2&gt;

&lt;p&gt;In the world of information security, hackers are often classified by &lt;strong&gt;color of "hat"&lt;/strong&gt;, a metaphor that comes from westerns where &lt;strong&gt;"white hats are the good guys, black hats are the bad guys"&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fap2t5l2ri4h0n2v9trpc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fap2t5l2ri4h0n2v9trpc.png" alt="Hackers' Hats" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here's a detailed classification:&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Black Hat&lt;/strong&gt; - “Black Hats”.
&lt;/h3&gt;

&lt;p&gt;😈 &lt;strong&gt;Malicious&lt;/strong&gt;, acting &lt;strong&gt;illegally&lt;/strong&gt;.&lt;br&gt;
These actors engage in hacking for profit, sabotage, or blackmail. They often use methods such as viruses, exploits, and phishing to infiltrate systems and steal sensitive data. While some operate independently, many work as part of organized criminal networks or even state-sponsored groups. Notable examples include ransomware gangs like REvil and Conti, as well as advanced persistent threat (APT) groups linked to nation-states.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;White Hat&lt;/strong&gt; - “White Hats”.
&lt;/h3&gt;

&lt;p&gt;😇 &lt;strong&gt;Ethical hackers&lt;/strong&gt;, operate &lt;strong&gt;legally&lt;/strong&gt;&lt;br&gt;
These individuals help organizations identify and fix security vulnerabilities. They typically work as penetration testers, participate in bug bounty programs, or operate within internal information security teams. Crucially, they conduct their testing with official authorization, ensuring that their activities are legal and aligned with the company’s goals. Examples include ethical hackers who contribute to platforms like HackerOne or Bugcrowd.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Grey Hat&lt;/strong&gt; - “Gray Hats.”
&lt;/h3&gt;

&lt;p&gt;❔ &lt;strong&gt;Intermediate&lt;/strong&gt;, balancing good and evil.&lt;br&gt;
These hackers operate without official authorization but typically do not cause harm. They may discover and report vulnerabilities to organizations, though their approach isn't always appropriate or welcome. In some cases, they even request a "reward" for their findings, blurring the line between ethical intent and questionable behavior. For example, someone might find a flaw on a bank’s website, report it without prior permission, and end up receiving either a thank-you - or a legal penalty.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Red Hat&lt;/strong&gt; &lt;strong&gt;(in some classifications)&lt;/strong&gt;.
&lt;/h3&gt;

&lt;p&gt;👊 &lt;strong&gt;Hackers who "war on blacks" aggressively&lt;/strong&gt;&lt;br&gt;
These individuals hack black hats in retaliation, often acting as digital vigilantes. While their intentions may align with defending others, they sometimes operate outside the boundaries of the law, making their actions legally and ethically ambiguous. They are closely related to activist groups and occasionally refer to themselves as “cyberhackers,” blurring the line between justice and vigilantism.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Blue Hat&lt;/strong&gt; are vigilantes or external testers.
&lt;/h3&gt;

&lt;p&gt;💁 Revenge and personal motives&lt;br&gt;
Blue hat hackers can be both vigilantes and external testers, but the most common definition refers to them as external security professionals hired by organizations to test systems for vulnerabilities before launch. However, in some contexts, the term "blue hat" is also used to describe individuals who engage in hacking activities for revenge or to target black hat hackers, acting as vigilantes. &lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Green Hat&lt;/strong&gt; are new.
&lt;/h3&gt;

&lt;p&gt;👽 &lt;strong&gt;Apprentices&lt;/strong&gt; who are just learning about hacking.&lt;br&gt;
Green hat hackers are “green” in the sense that they are inexperienced and may not have the technical skills of more experienced hackers. At this amateur level, they may not intentionally seek to cause harm, but may do so accidentally.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Сongrats! As you've already touched on the secret side of the cybersecurity and dipped into it a bit, your hat's begun to take on a green color&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv9yifhier05wrhi8symo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv9yifhier05wrhi8symo.png" alt="Hacktivist and Script kiddies" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  👫 Hacktivist
&lt;/h2&gt;

&lt;p&gt;It's not about money or profit(in any form) - it's about an idea. And when the idea takes the lead, untampered by money or practical limits, we all know where that can lead.&lt;/p&gt;

&lt;p&gt;A &lt;strong&gt;hacktivist&lt;/strong&gt; is an actor who engages in "hacktivism," which combines hacking with activism to advance political or social causes. Hacktivists use their technical skills to disrupt, protest, or leak information, often targeting organizations or governments they oppose. &lt;/p&gt;

&lt;h2&gt;
  
  
  👶 Script kiddies (amateur hackers)
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Script kiddies&lt;/strong&gt; is slang for amateur hackers who lack the technical skills needed to create their own hacking programs or conduct sophisticated attacks, such as SQL injections, so they use scripts created by others. Despite being novices, script kiddies are still dangerous - especially since they often don’t fully understand the damage they can do with the pre-created programs they use.&lt;/p&gt;




&lt;p&gt;While we’ve touched on some of the most well-known hacker profiles and motivations, this is far from an exhaustive list. The world of cybersecurity is layered and constantly shifting, and new threat profiles emerge just as quickly as old ones evolve. Future sections will dive deeper into more specific and complex classifications - but for now, you have a clear understanding of who might be targeting you, what motivates them, and what kind of behavior you can expect.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Unfortunately, no one can be told what the Matrix is. You have to see it for yourself. - The Matrix (1999)&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Just like the Matrix, no article can prepare you for everything - but now, at least, you know what to start paying attention to.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>beginners</category>
      <category>theory</category>
      <category>hacker</category>
    </item>
    <item>
      <title>Boring Cybersecurity Theory: CIA Triad (The Core Principles of Security)</title>
      <dc:creator>Dzmitry Harbachou</dc:creator>
      <pubDate>Wed, 13 Aug 2025 15:41:33 +0000</pubDate>
      <link>https://dev.to/dharbachou/boring-cybersecurity-theory-cia-triad-the-core-principles-of-security-3m3k</link>
      <guid>https://dev.to/dharbachou/boring-cybersecurity-theory-cia-triad-the-core-principles-of-security-3m3k</guid>
      <description>&lt;p&gt;We’ve looked at how cybersecurity came to be - how it grew from simple beginnings into a global necessity. Now, it's time to move from history to understanding the present.&lt;/p&gt;

&lt;p&gt;As the digital world expands, so does the need to understand the core ideas and principles that guide how we protect it. Before we explore tools and frameworks, we need to establish a clear foundation: the fundamentals of cybersecurity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cybersecurity is the practice of protecting digital systems, networks, applications, and data from unauthorized access, misuse, or disruption&lt;/strong&gt;. It involves both technical defenses and strategic processes aimed at reducing risk and ensuring that digital environments remain secure and reliable.&lt;/p&gt;

&lt;p&gt;The main goals of cybersecurity can be grouped into three key areas:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Confidentiality - keeping sensitive data private.&lt;/li&gt;
&lt;li&gt;Integrity - ensuring information remains accurate and trustworthy.&lt;/li&gt;
&lt;li&gt;Availability - making sure systems and data are accessible when needed.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These objectives form the foundation of modern cybersecurity - and they’re captured in a simple but powerful model known as the &lt;strong&gt;CIA Triad&lt;/strong&gt;, which we’ll explore next.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgleok06bd6r6neq3qsn6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgleok06bd6r6neq3qsn6.png" alt=" " width="800" height="388"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The CIA triad is a model that helps inform how organizations consider risk when setting up systems and security policies. It is made up of three elements that cybersecurity analysts and organizations work toward upholding: confidentiality, integrity, and availability.&lt;/strong&gt; Maintaining an acceptable level of risk and ensuring systems and policies are designed with these elements in mind helps establish a successful security posture, which refers to an organization’s ability to manage its defense of critical assets and data and react to change. &lt;/p&gt;

&lt;h2&gt;
  
  
  Confidentiality
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Confidentiality is the idea that only authorized users can access specific assets or data&lt;/strong&gt;. In an organization, confidentiality can be enhanced through the implementation of design principles, such as the principle of least privilege. The principle of least privilege limits users' access to only the information they need to complete work-related tasks. Limiting access is one way of maintaining the confidentiality and security of private data. &lt;/p&gt;

&lt;h2&gt;
  
  
  Integrity
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Integrity is the idea that the data is verifiably correct, authentic, and reliable&lt;/strong&gt;. Having protocols in place to verify the authenticity of data is essential. One way to verify data integrity is through cryptography, which is used to transform data so unauthorized parties cannot read or tamper with it (NIST, 2022). Another example of how an organization might implement integrity is by enabling encryption, which is the process of converting data from a readable format to an encoded format. Encryption can be used to prevent access and ensure data, such as messages on an organization's internal chat platform, cannot be tampered with.  &lt;/p&gt;

&lt;h2&gt;
  
  
  Availability
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Availability is the idea that data is accessible to those who are authorized to use it&lt;/strong&gt;. When a system adheres to both availability and confidentiality principles, data can be used when needed. In the workplace, this could mean that the organization allows remote employees to access its internal network to perform their jobs. It’s worth noting that access to data on the internal network is still limited, depending on what type of access employees need to do their jobs. If, for example, an employee works in the organization’s accounting department, they might need access to corporate accounts but not data related to ongoing development projects. &lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;The CIA triad is essential for establishing an organization’s security posture. Knowing what it is and how it’s applied can help you better understand how security teams work to protect organizations and the people they serve.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>beginners</category>
      <category>basic</category>
      <category>theory</category>
    </item>
    <item>
      <title>Boring Cybersecurity Theory: Where it all began</title>
      <dc:creator>Dzmitry Harbachou</dc:creator>
      <pubDate>Wed, 13 Aug 2025 15:40:44 +0000</pubDate>
      <link>https://dev.to/dharbachou/boring-cybersecurity-theory-where-it-all-began-4m6b</link>
      <guid>https://dev.to/dharbachou/boring-cybersecurity-theory-where-it-all-began-4m6b</guid>
      <description>&lt;p&gt;We've all faced security in one way or another, and most of us have at least a basic understanding of what it is. So before we dive into the details, let's go back in time - to the days of magnetic mice, bulky CRT monitors - when the sun seemed a little warmer and the world a little simpler.&lt;/p&gt;

&lt;h2&gt;
  
  
  Where It All Began
&lt;/h2&gt;

&lt;p&gt;The history of cybersecurity is mostly a history of faults (&lt;em&gt;please do not mix it up with bugs&lt;/em&gt;), vulnerabilities, and attempts to close them. Cybersecurity as a discipline emerged not because someone came up with “let's protect computers” in advance, but because they started breaking them.&lt;/p&gt;

&lt;h3&gt;
  
  
  1950s
&lt;/h3&gt;

&lt;p&gt;Alright, let's imagine that our journey begins in the 1950s. Huge computers occupying entire rooms or even buildings, with unrealistic prices that ordinary users simply could not afford. These machines were used mainly by scientists and military men - for calculations, modeling and other serious tasks. Security was physical access control: if you weren't in the building, you couldn't access the data. To protect information, locks, badges, and guards were used, not software. There was no concept of “hackers,” viruses, or network attacks - simply because there were no networks. All programs were run manually or on a schedule. There was no OS in the usual view, no multi-user access, one computer - one person or group. Data was stored on punched cards, magnetic tapes and drums. No encryption. If you accessed the media, you got everything.&lt;/p&gt;

&lt;h3&gt;
  
  
  1960s
&lt;/h3&gt;

&lt;p&gt;Let's go forward 10 years, the '60s. In the 1960s, the first full-fledged operating systems and the concept of multi-user mode began to be actively developed. Computers were becoming more and more powerful, and it made sense to share their resources among several users. Thus, the idea of time-sharing was born - temporarily dividing access to the processor, which was a turning point for cybersecurity. Along with this came the first passwords and initial access control mechanisms: each user had to log in somehow, isolate their processes and protect their data. It was during this period that the realization dawned that threats could come from other users on the same system. Developers started thinking about access control, user rights and isolation - and this became the foundation of future information security models.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;In 1965, while working with the CTSS system (one of the first multi-user operating systems), a student at MIT encountered a time limit on machine access. To get around this limitation, he wrote a script that copied a system file containing the passwords of all users. CTSS stored this file in the clear, with no encryption or protection. By accessing other people's accounts, the student was able to log in under different names and gain more computing time.&lt;/p&gt;

&lt;p&gt;This incident is considered the first recorded case of password cracking in history, and was one of the first calls for real data protection even in closed systems.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  1970
&lt;/h3&gt;

&lt;p&gt;In 1969, ARPANET, the world's first computer network, was launched and became the forerunner of the Internet. In the 1970s, it grew rapidly, connecting universities, military institutions and research centers. Initially, ARPANET was designed as an open environment for trusted users, so it had no built-in authentication, encryption or protection against intruders. As the network grew, the first incidents began to appear: unauthorized access, misuse of resources, and remote login attempts. These events sent an important signal: for the first time, security began to be seen as an integral part of network architecture. This decade marked the beginning of discussions on network ethics, user behavior, and technical protection of information in distributed systems.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;In 1973, a user discovered that he could connect to a remote system via the ARPANET without authorization, exploiting a vulnerability in the network software. This case was the first recorded remote network intrusion, demonstrating that even among “trusted” participants, real security threats were possible. The incident led to a discussion of the need for systemic access control and the formation of the first network policies.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  1980
&lt;/h3&gt;

&lt;p&gt;In the 1980s, computers were no longer strictly scientific and military tools - the era of the personal PC had begun. With the introduction of the IBM PC, MS-DOS and Apple II, millions of people gained access to computing technology, and with it the first computer viruses began to spread. Most attacks occurred offline - via floppy disks carried from machine to machine. This period also saw the first anti-viruses, firewalls and access controls. Against this backdrop, new laws governing computer crime are formed, and hacker culture emerges from the shadows: groups, manifestos and the first high-profile arrests appear. Information security is becoming a necessity - not only for the military, but also for businesses and private users.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Brain is the first mass-market virus (1986)&lt;/strong&gt;&lt;br&gt;
Created by two brothers from Pakistan "for a good cause," the Brain virus infected the boot sector of floppy disks and spread around the world. It displayed the contact information of authors who did not expect a global epidemic.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;First worm on the Internet - Morris worm (1988)&lt;/strong&gt;&lt;br&gt;
Launched by student Robert Morris, this worm infected about 10% of all computers connected to the ARPANET due to a bug in the code. This was the first mass network infection, leading to the creation of CERT, the first computer incident response team.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hacker Culture and Manifesto (1986)&lt;/strong&gt;&lt;br&gt;
After a hacker was arrested under the pseudonym The Mentor, he wrote a "Hacker Manifesto" in which he advocated the ideas of freedom of information and curiosity. The document became a symbol of hacker ethics and is still quoted in subcultures today.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  1990s
&lt;/h3&gt;

&lt;p&gt;In the 1990s, the Internet expanded beyond the academic and military environments and became available to the general public. At the same time, new attack vectors emerge: through e-mail, Web sites, and network services. Malware, macro viruses, and social engineering are spreading. For the first time, users are facing massive phishing attacks, viruses in office documents, and Trojans disguised as useful software. In response, an entire ecosystem of defense solutions emerges: antiviruses, firewalls, intrusion detection systems (IDS). Large companies begin to build their first information security strategies. At the same time, the first international cybercrime laws are formed, and hacker groups enter the global arena.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;My favorite story is the one about NASA. I don't know a single person who hasn't heard of NASA. But if you haven't, NASA is the U.S. government agency responsible for the civilian space program and aerospace research.&lt;br&gt;
So what happened there?&lt;/p&gt;

&lt;p&gt;In 1999, a 15-year-old teenager from California gained access to NASA and Pentagon systems using the simplest method - automated password guessing. Most accounts had passwords like &lt;strong&gt;"password"&lt;/strong&gt;, &lt;strong&gt;"1234"&lt;/strong&gt;, or even had &lt;strong&gt;no password at all&lt;/strong&gt;. &lt;/p&gt;

&lt;p&gt;NASA had to shut down its spacecraft control systems for 21 days, and the damage was estimated at &lt;strong&gt;$1.7 million&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;The hacker was arrested, but the case went down in history as a textbook example of cybersecurity negligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This brings us to the end of the review of the key moments that led to the emergence of a new discipline: &lt;strong&gt;&lt;em&gt;cybersecurity&lt;/em&gt;&lt;/strong&gt;. As we can see, it did not develop as a carefully planned endeavor, but rather as a reaction to human error, short-sightedness, and the unforeseen consequences of our own creations. Of course, the story doesn’t end here - many fascinating events have unfolded since then, leading us to where we are today. Yet, that is a story for another time.&lt;/p&gt;

&lt;p&gt;I never thought this article would make you an expert in cybersecurity, and I didn't expect it to be interesting to everyone (&lt;em&gt;After all, why read about something that has already happened?&lt;/em&gt;). But, in my opinion, there are a few lessons worth remembering here:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;You don't have to solve all problems yourself; sometimes it's enough just to read about them.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;You can never be completely sure that you've considered everything.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;And finally, just because something does not exist yet does not mean that it cannot appear in the future.&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>cybersecurity</category>
      <category>beginners</category>
      <category>security</category>
      <category>theory</category>
    </item>
  </channel>
</rss>
