What is the Cyber Kill Chain Process?

InfosecTrain - A podcast by InfosecTrain

Categories:

In the last few years, there has been an increase in Advanced Persistent Threat (APT) actors trained to perform MITRE intrusion campaigns aimed at stealing sensitive economic and national security data. Organizations require a method to safeguard systems or networks from APTs and other significant attacks. So, Lockheed Martin created a Cyber Kill Chain process for detecting and preventing cyber intrusion attacks from keeping track of such attacks. Many businesses employ the Cyber Kill Chain approach to protect themselves against data breaches and phishing attempts. What is a Cyber Kill Chain? Cyber Kill Chain is a concept that allows the organization to understand how an attacker intends to penetrate or destroy the target’s system or network. It also helps businesses understand how to protect, detect, respond to, and locate an attacker’s techniques or strategies for infiltrating target systems. The term “Kill Chain” comes from the military and refers to the method that an enemy uses to strike a target. The Kill Chain method identifies seven steps that an attacker goes through, each of which provides an opportunity to detect and react, that covers: View More

Visit the podcast's native language site