Satan's TTPs/Sub-Techniques
OK, so I have just been reading and studying something very interesting on my own. It connects directly with my cybersecurity education. I have been studying cyber threat intelligence and the MITRE ATT&CK framework, and it is very interesting. I would truly love to have a job doing this—even in the smallest capacity—just to be able to work in this field. In cyber threat intelligence, we use TTPs—tactics, techniques, and procedures. The MITRE ATT&CK framework uses tactics, techniques, and sub-techniques. Sub-techniques are essentially the same as procedures. All of this deals with bad actors—people who attempt to steal intellectual property, credentials, and many other things. They have motives. They use tactics. They apply techniques and procedures in order to accomplish what they want to do. As I was thinking about this this morning, it struck me that, in the very same way, Satan operates against all of us. So, first, we look at tactics—the “what” and the “why.” What...