Cyber Security Kill Chain
Jump to navigation
Jump to search
1. A kill chain is used to describe the various stages of a cyber security attack.
|
2. The cyber kill chain enumerates the steps that an attacker follows to steal or damage a target asset inside a company.
Source: (Patterson, 2016)
3. The Cyber Kill Chain is a process developed by Lockheed Martin that outlines several key steps threat analysts can use to identify key points in an attack where the chain can be broken to prevent a breach.
Source: (Secplicity, 2016)
4. It maps a potential security breach: tracing stages of attack from the early reconnaissance stages to the exfiltration of data. The kill chain helps us understand and combat ransomware, security breaches, and advanced persistent attacks (APTs).
Source: (Hospelhorn, 2016)