To access material, start machines and answer questions login.
In this room, we will explore the world of defensive security (also known as blue teaming). We will uncover how defensive security teams play a key role in protecting networks and organisations across the globe, and understand what defensive security looks like in practice.
Unfortunately, headlines show us what happens when defensive security falls short. From large-scale ransomware attacks on healthcare systems to data leaks at major corporations, the impact of poor security can be severe and incredibly costly for an organisation, with fines to follow. Here are some real-world examples:
What is defensive security also known as?
This task will explore defensive security in more depth. You will also meet some of the experts within a defensive security team to learn more about their day-to-day responsibilities.
Let's start by focusing on some key areas of defensive security:
What's more, a defensive security team is made up of a mixture of roles and responsibilities. Below, let's meet some of the highly-skilled individuals you would find within a defensive security team:
An attack has been detected on an organisation's network. What is the name of the person above who would be responsible for responding to the attack?
Now that you’ve been introduced to defensive security and met some key individuals, let's understand how it is applied.
Organisations don’t rely on a single tool or method to stay secure — they build layers of defence, much like an onion or many layers to a castle. We call this "Defence in Depth," meaning that if one security measure fails, we have others to rely upon at various stages.
Examples of these defensive measures include:
This means that even if an employee clicks on a dangerous attachment in an email, other protections are in place to prevent the malicious attachment from harming the organisation.
Defensive security teams rely on a wide range of tools and technologies. These tools allow professionals to analyse information and investigate threats more effectively. This section will look at some key technologies commonly used by defensive security teams worldwide.
Exploring the Security Operations Centre (SOC)
Think of a SOC as the defensive security centre for an organisation's technology. This busy centre is the frontline of protecting an organisation, often operating around the clock, 365 days a year, and employs a variety of security professionals who monitor and protect the organisation's networks, systems, and data.
A typical day in the SOC could look like:
- Reviewing alerts triggered by security tooling
- Investigating anomalies
- Responding to incidents
These professionals are often the eyes and ears on the frontline for protecting an organisation.
SIEMs: The Defensive Security Radar
Much like a control centre in the real world, SIEMs (Security Information and Event Management) systems are the central place for all data and information collected from security devices, workstations, servers, and more within an organisation.
Much like radar sweeping the digital environment, these systems are an absolutely critical part of any organisation's defensive security, as they offer insight into what is happening within the organisation's IT.
The systems inside an organisation produce a large amount of information. This information needs to be brought together in one central and easy-to-access place to understand what's happening quickly and clearly. This way, several people can review and analyse it quickly.
What is the abbreviation for the term "Security Operations Centre"?
Phew, well done for progressing this far. Now, you will complete a hands-on exercise within a defensive security team to investigate an active attack.
Scenario
You will be joining the defensive security team for FakeBank, a large financial institution. You will be at the forefront of investigating and resolving suspicious events marked as such by FakeBank's sophisticated "Security Information and Event Management (SIEM)."
It is your duty to protect FakeBank and it's customers. Be proactive and inquisitive. To begin this practical, click on the green "View Site" button located below.
This action will open a "static site" on the right side of your screen. Investigate the "Web Discovery Attack" and perform the necessary, guided, protective measures to stop it from continuing.
What is the flag that you obtained by following along?
Ready to learn Cyber Security? Create your free account today!
TryHackMe provides free online cyber security training to secure jobs & upskill through a fun, interactive learning environment.
Already have an account? Log in