Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
What this Pull Request (PR) does
My PR adds the create_idea_compass pattern using the Zettelkasten method of note taking
Below is the output using Claude Opus
Here is a summary of the key points from the survey on adversarial reconnaissance techniques:
Tags:: #cybersecurity #reconnaissance #adversary #taxonomy
Date:: 04/19/2023
Idea/Question::
The paper provides a comprehensive survey and taxonomy of the techniques, tactics, and tools that adversaries use to conduct reconnaissance activities throughout the cyber attack process. It aims to categorize and understand this complex but vital aspect of cyber attacks.
Definition::
Reconnaissance refers to the ongoing process used by attackers to gather as much information as possible about target systems or networks that can be used to conduct various types of malicious activity, such as gaining unauthorized access or denial of service. It plays a crucial role throughout the cyber kill chain.
Evidence::
Reconnaissance enables attackers to understand system configurations and find ways to exploit vulnerabilities. Case studies like the Ukrainian power grid cyberattack and Bangladesh Bank cyber heist show the importance of both external and internal reconnaissance.
The paper categorizes target information into non-technical (organization details, people information) and technical (network, host, application, user-level).
Reconnaissance occurs in two main phases - external (before gaining network access) and internal (after breaching the network).
The taxonomy categorizes recon techniques based on the source: third-party (footprinting), human-based (social engineering), and system-based (scanning, sniffing, side-channel attacks).
Source::
Roy, S., Sharmin, N., Acosta, J.C., Kiekintveld, C. and Laszka, A., 2022. Survey and Taxonomy of Adversarial Reconnaissance Techniques. ACM Computing Surveys (CSUR).
West:: Similar
East:: Opposite
North:: theme/question
South:: What does this lead to?
Related issues
No issue adding a new pattern
Screenshots