Do you need a bolt cutter or a saw? Breaking the Cyber Kill Chain....
An Introduction to the cyber kill chain countermeasures and threat intelligence maturity.
✅ ✅ ✅ Article Content
✅ Demystifying the Cyber Kill Chain.......
The Cyber Kill Chain model was developed by researchers at Lockheed Martin. Inspired by the U.S. military's term "kill chain" ... the steps an adversary takes to attack an entity.
"The Cyber Kill Chain framework (♨️ ⫸ see image 1 below ) assists with identification and prevention of cyber intrusion activities. The model identifies what adversaries must complete in order to achieve their objective. The seven steps of the Cyber Kill Chain® enhances visibility into an attack and enriches an analyst’s understanding of an adversary’s tactics, techniques and procedures."
-Lockheed Martin- Cyber Kill Chain
⫸ Image 1 - The Cyber Kill Chain framework (7 steps) ⫷
✅ Countermeasures......
1. Applying the Cyber Kill Chain To Network Defense
Adversary vs Defender -💡💡This guide (link below) presents defensive measures that can work to harden and add resilience to a security program. This guide also present actionable defenses at each stage of the kill chain.
Recommended by LinkedIn
2. Countermeasures: Breaking The Kill Chain: A Defensive Approach -!!!!BEST Video EVER!!!! .... yes I know it's great :)
3. Seven Ways to Apply the Cyber Kill Chain with a Threat Intelligence Platform
💡💡Using the cyber kill chain model to improve your defense in depth Strategy... This guide (link below) includes a model that enterprises can customize in order to visually point out gaps in protections (empty boxes) which can be a potential place of needed investments. This guide also emphasizes the need for entities to create internal threat intelligence platform based on what occurs in their environment rather than relying solely on external sources. Overall propelling organization forward in their security maturity.
✅ Applied Scenario - Advanced persistent Threat (APT) Attacks, Target: The Gaming Sector
💡💡 Analysis through the lens of the Cyber Kill Chain
Source: FEMA course AWR-403- Examining Advanced Persistent Attacks Course: Case Studies and Prevention Techniques of Advanced Persistent Threats
Thanks for Reading... until next time my friends!!!!
-Gordon.
Cybersecurity Professional - Business Information Security Officer - Servant Leader - Learner - Relationship Builder
6moGood article and video. Easy to read and understand. Thanks for sharing.
CSO||Certified Digital Forensic Examiner|Doctoral Researcher|Founder|Keynote Speaker|DFIR Investigator🧩Malware/Reverse Engineer|Expert Witness|Assisting in IT Audits, Litigations and Breach Recovery◉Let's Talk Security
6moThere is so much more!!!👩💻