InfosecTrain

What is the Cyber Kill Chain Process?


Listen Later

In the last few years, there has been an increase in Advanced Persistent Threat (APT) actors trained to perform MITRE intrusion campaigns aimed at stealing sensitive economic and national security data. Organizations require a method to safeguard systems or networks from APTs and other significant attacks. So, Lockheed Martin created a Cyber Kill Chain process for detecting and preventing cyber intrusion attacks from keeping track of such attacks. Many businesses employ the Cyber Kill Chain approach to protect themselves against data breaches and phishing attempts.

What is a Cyber Kill Chain?

Cyber Kill Chain is a concept that allows the organization to understand how an attacker intends to penetrate or destroy the target’s system or network. It also helps businesses understand how to protect, detect, respond to, and locate an attacker’s techniques or strategies for infiltrating target systems. The term “Kill Chain” comes from the military and refers to the method that an enemy uses to strike a target. The Kill Chain method identifies seven steps that an attacker goes through, each of which provides an opportunity to detect and react, that covers:

View More

...more
View all episodesView all episodes
Download on the App Store

InfosecTrainBy InfosecTrain

  • 3.7
  • 3.7
  • 3.7
  • 3.7
  • 3.7

3.7

3 ratings


More shows like InfosecTrain

View all
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

649 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,033 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

178 Listeners

Certified: The CompTIA Security+ Audio Course by Dr. Jason Edwards

Certified: The CompTIA Security+ Audio Course

3 Listeners