Most common cyberattack techniques of 2020

Most common cyberattack techniques of 2020

Assessment

Interactive Video

Architecture, Information Technology (IT)

University

Hard

Created by

Quizizz Content

FREE Resource

The video discusses the 2021 threat detection report by Red Canary, highlighting the top ten threat techniques, many of which involve 'living off the land' attacks using existing tools like PowerShell. It emphasizes the importance of establishing a baseline of normal system behavior to detect anomalies. Key threats include signed binary process executions, system process modifications, scheduled tasks, credential dumping, and more. The video recommends using sysmon for logging and monitoring, and stresses the need for off-site log storage to prevent attackers from clearing logs.

Read more

1 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What new insight or understanding did you gain from this video?

Evaluate responses using AI:

OFF