What is Cyber Kill Chain?
The Cyber Kill Chain is a framework developed by Lockheed Martin to understand and prevent cyber attacks. It breaks down a typical cyber attack into several phases, allowing security teams to identify and stop attacks at various stages.
The seven phases of the Cyber Kill Chain are:
-
Reconnaissance: The attacker gathers information about the target.
-
Weaponization: Malware or tools are developed based on the gathered information.
-
Delivery: Malware is delivered to the target, for example, via phishing emails.
-
Exploitation: The attacker exploits vulnerabilities to gain access to the system.
-
Installation: Malware is installed on the target’s system.
-
Command and control: The attacker establishes a communication channel to remotely control the infected system.
-
Actions on objectives: The attacker performs their objectives, which may include data theft or damage to the system.
How can you resist an attack in the seven different phases of a Cyber Kill Chain?
To resist a cyber-attack at the seven different stages of the Cyber Kill Chain, you can take the following measures:
1. Reconnaissance:
2. Weaponization:
3. Delivery:
4. Exploitation:
5. Installation:
6. Command and control:
7. Actions on objectives:
Sicra and Cyber Kill Chain
The Cyber Kill Chain describes various phases of a cyber attack, and each phase requires different countermeasures. This involves both implementing technical solutions such as firewalls, SOC, and email filtering, as well as training employees in secure data handling.
Sicra can provide both security specialists with extensive experience and security consulting through our CISO-for-hire service.
Services:
Read about our "security monitoring and incident management (SOC)" service here >
Read about our "firewall" service here >
Read about our "CISO-for-Hire" service here >
Related words: API, Cyberattack, Cybersecurity, DORA, GDPR, GIAC, Grayhat, IIoT, IoT, OT, NIS2, NTLM, SOC, SIEM, CISO-for-hire, Firewall, Phishing, Social engineering, Whitehat, MDR, Pentesting, Threat intelligence, Best practice.