Turning the tables on cyber criminals

using the cyber kill chain framework to protect your organisation

Cover from Turning the tables on cyber criminals

Date: 2nd August, 2015
By:
Format: EBook

Free Download (subject to terms)
REGISTER to download or LOG IN to download

THE KILL CHAIN is a concept that has been borrowed from the military. It describes the phases that are involved in an attack. It came into use in the commercial sector in 2011 when Lockheed Martin coined the phrase “cyber kill chain” to describe the phases that are involved in any advanced targeted attack on computer networks. These are: reconnaissance, weaponisation, delivery, exploitation, installation, command and control, and action.

Every phase of the kill chain provides an opportunity to disrupt attacker activity using a combination of people, processes and technology. The earlier that an attacker can be disrupted, the easier and quicker it is for an organisation to mitigate the threat and prevent serious interruption to their operations, as well as preventing the consequences and costs of a full-blown assault.

Any organisation, whatever its size or line of business, could be the target of an advanced attack. This document describes what options are available for disrupting attackers at each stage of the kill chain.

Post a review?

We welcome constructive criticism on all of our published content. Your name will be published against this review after it has been moderated. We reserve the right to contact you by email if needed.

Star Rating 1-5 (low-high):

If you don't want to see the security question, please register and login.