post Examining the Cyber Kill Chain.
Rodrigo introduces us to threat analysis and the wisdom of segmenting real and perceived offensive attacks into a series of separate steps or stages. He points out the increased difficulty of processing and evaluating information from higher and more complex kill chain levels. Lots of new ideas to ponder and a new lexicon to boot, for me at least. I wasn't familiar with the concept of privilege escalation, the act of exploiting a flaw or weakness in a system configuration to give a user unauthorized or elevated access and privileges.
Bijou stresses the need for new and unique analytic approaches to gauge and identify potentially malevolent cyber intrusions and their commensurate datasets. One thought I had was that the wisdom of these new analytic approaches could be useful for both offensive and defensive actions. Very well done analysis. Hope that I can keep up!