CHAPTER
22 Cyber Situation Understanding: What’s Going On
Overview
• 22.1 Situation Understanding Interplay with Command and Control
• 22.2 Situation-Based Decision Making: The OODA Loop
• 22.3 Grasping the Nature of the Attack
• 22.3.1 What Vulnerability Is It Exploiting?
• 22.3.2 Which Paths Are the Attacks Using?
• 22.3.3 Are the Paths Still Open?
• 22.3.4 How Can the Infiltration, Exfiltration, and Propagation Paths Be Closed?
• 22.4 The Implication to Mission
• 22.4.3 Nature and Locus Guiding Defense
• 22.5 Assessing Attack Damages
Get Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.