From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Hunting threats

Hunting threats

- [Instructor] Cybersecurity specialist actively hunt threats with the intent of finding and rooting out potential cyber attacks that may have infiltrated our systems undetected. Let's put this into perspective. To secure the network, we provide protection in three separate concepts, security threat management and forensics. Although the three concepts are related, they have distinct differences as follows: security includes proactive methods to protect the network, prevent damage or theft of physical or logical objects, and ensure the safety of individuals. For example, we secure our systems by providing access controls. Threat management is actively working to prevent an attack or system compromise, such as monitoring and hunting threats. Forensics is reactive in that the activity is done after a cyber attack. Malicious actors are organized, skilled and well-funded. They're constantly trying to identify…

Contents