mirror of
https://github.com/MichaelCade/90DaysOfDevOps.git
synced 2024-12-22 15:43:11 +07:00
minor typo-error fix
This commit is contained in:
parent
554fac3e74
commit
48594fe7c6
@ -53,7 +53,7 @@ The big question is how do we get those features and bug fixes into our products
|
||||
|
||||
How do we release the new application version? This is one of the main tasks for a DevOps engineer, and the important thing here is not to just figure out how to do this once but we need to do this continuously and in an automated, efficient way which also needs to include testing!
|
||||
|
||||
This is where we are going to end this day of learning, hopefully, this was useful. Over the next few days, we are going to dive a little deeper into some more areas of DevOps and then we will get into the sections that dive deeper into the tooling and processes and the benefits of these.
|
||||
This is where we are going to end this day of learning, hopefully, this was useful. Over the next few days, we are going to dive a little deeper into some other areas of DevOps and then we will get into the sections that dive deeper into the tooling and processes and the benefits of these.
|
||||
|
||||
## Resources
|
||||
|
||||
|
@ -29,7 +29,7 @@ We must consider the following:
|
||||
|
||||
The motivations of an attacker will also be different depending on the attacker. I mean it could just be for fun... We have probably all been there, in school and just gone a little too deep into the network looking for more information. Who has a story to tell?
|
||||
|
||||
But as we have seen in the media attacks are more aligned to monetary, fraud or even political attacks on businesses and organisations.
|
||||
But as we have seen in the media, attacks are more aligned to monetary, fraud or even political attacks on businesses and organisations.
|
||||
|
||||
In the Kubernetes space, we have even seen attackers leveraging and using the computing power of an environment to mine cryptocurrency.
|
||||
|
||||
@ -41,9 +41,9 @@ A company’s data is likely going to be extremely valuable to the company but a
|
||||
|
||||
We now have a motive and some of the characteristics of an attacker or a group of attackers, if this is a planned attack then you are going to need a plan, you are going to need to identify what services and data you are targeting.
|
||||
|
||||
An attack map is a visual representation of an attack on a computer network. It shows the various stages of the attack, the tools and techniques used by the attacker, and the points of entry and exit into the network. Attack maps can be used to analyse the details of past attacks, identify vulnerabilities in a network, and plan defences against future attacks. They can also be used to communicate information about an attack to non-technical stakeholders, such as executives or legal teams.
|
||||
An **attack** map is a visual representation of an attack on a computer network. It shows the various stages of the attack, the tools and techniques used by the attacker, and the points of entry and exit into the network. Attack maps can be used to analyse the details of past attacks, identify vulnerabilities in a network, and plan defences against future attacks. They can also be used to communicate information about an attack to non-technical stakeholders, such as executives or legal teams.
|
||||
|
||||
You can see from the above description that an Attack Map should be created on both sides or both teams (teams wise this is something I am going to cover in a later post)
|
||||
You can see from the above description that an Attack Map should be created on both sides or both teams (teams-wise this is something I am going to cover in a later post)
|
||||
|
||||
If you were to create an Attack Map of your home network or your business some of the things, you would want to capture would be:
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user