Introducing the Cyber Kill Chain
The Cyber Kill Chain, despite how fancy it sounds, in reality is just a step-by-step description of how hackers attack and how a cyber-attack generally plays out. The model describes the steps of the advisories from the beginning until it's exploited, as you can see in the following illustration:
Figure 1: The Cybersecurity Kill Chain stages
The cybersecurity kill chain is a security model that organizations use to track and prevent cyber intrusions at their various stages. The kill chain has been used with varying degrees of success against ransomware, hacking attempts, and APTs (advanced persistent threats).
The kill chain is attributed to Lockheed Martin, who derived it from a military model used to effectively neutralize targets by anticipating their attacks, engaging them strategically, and destroying them. This chapter discusses the key steps in a cyber kill chain and highlights the latest tools used in each of them.
The following...