Security controls used to stop the Cyber Kill Chain
There are several methods that an organization can use to stop the different stages of the cyber kill chain. It can do this by implementing various security controls. Some of the effective security controls that have been identified include:
- Detect: In this security control, an organization will determine all attempts by attackers to gain access to the system. This includes attempted scans of the system by outsiders to determine a system’s potential vulnerabilities.
- Deny: Thwarting attacks while they are in progress. The security team should move swiftly to stop any attacks when they get information regarding any possible attack.
- Disrupt: This includes efforts by the security team to intercept any communication between the attackers and the system and interrupt this communication. Communication may be feedback on queries done by attackers on the system to determine various elements of the system before...