Know Thy Enemy: Tools, Tactics, and Techniques of Cybercriminals

Many view the cybercriminal as an unknown.  This is due, in part, to the difficulty inherent in tracking down individual attackers.  However, we do not need to identify each individual cybercriminal to understand cybercriminals, and this understanding is invaluable.

Sun Tzu, the legendary Chinese tactician said, “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.”

We must know our enemy because then he can be conquered.   An understanding of cybercriminals motivations, methods, and mechanisms of attack allows us to develop effective countermeasures and avoid security initiatives that produce little or no value.

Knowledge also removes fear.  Fear can prompt action, and this is a good response, but responses to fear are inconsistent and short-lived.  Others are not inspired to act.  Instead, they become petrified, and some become apathetic.

I wrote an article titled “Cybersecurity Threats and the Criminals Behind Them” with Juniper Networks.  This article will help you understand cybercriminals, how they operate, the tools they use, and how they are organized.  It is far better to know our enemy so that we can leave fear behind and take informed action.

About The Author

Eric Vanderburg

Eric Vanderburg is an author, thought leader, and consultant. He serves as the Vice President of Cybersecurity at TCDI and Vice Chairman of the board at TechMin. He is best known for his insight on cybersecurity, privacy, data protection, and storage. Eric is a continual learner who has earned over 40 technology and security certifications. He has a strong desire to share technology insights with the community. Eric is the author of several books and he frequently writes articles for magazines, journals, and other publications.

Leave a Reply