Cyber Kill Chain
The cyber attack chain also referred to as the cyber kill chain is a way to understand the sequence of events involved in an external attack on an organization s it environment.
Cyber kill chain. Similar in concept to the military s model it defines the steps used by cyber attackers in today s cyber based attacks. Developed by lockheed martin the cyber kill chain framework is part of the intelligence driven defense model for identification and prevention of cyber intrusions activity. In 2011 lockheed martin released a paper defining a cyber kill chain. First of all let me define cyber kill chain the steps used by cyber attackers in today s cyber based attacks.
However acceptance is not universal with critics pointing to what they believe are fundamental flaws in the model. Designing your monitoring and response plan around the cyber kill chain model is an effective method because it focuses on. The cyber kill chain is a dynamic and intuitive model that describes the behavior of a malicious actor in his attempt to penetrate an infrastructure for the purpose of data exfiltration. The theory is that by understanding each of these stages defenders can better.
Although not a solution on its own ckk can provide an insightful glimpse into the mind of a cyber criminal and aid the csir team in formulating kill phase based actions. The model identifies what the adversaries must complete in order to achieve their objective. The cyber kill chain is a series of steps that trace stages of a cyberattack from the early reconnaissance stages to the exfiltration of data. The actual steps in a kill chain trace the typical stages of a cyber attack from early reconnaissance to completion where the intruder.
The military kill chain f2t2ea. A kill chain is used to describe the various stages of a cyber attack as it pertains to network security the actual model the cyber kill chain framework was developed by lockheed martin and is used for identification and prevention of cyber intrusions. The cyber kill chain model has seen some adoption in the information security community. In general the cyber kill chain is a step by step description of what a complex attack does.
The cyber kill chain is a sequence of stages required for an attacker to successfully infiltrate a network and exfiltrate data from it. Understanding the cyber attack chain model can help it security teams put strategies and technologies in place to kill or contain the attack at various stages and better protect the it ecosystem. Some experts describe the cyber kill chain as representing the stages of a cyberattack. Each stage demonstrates a specific goal along the attacker s path.
The theory is that by understanding each of these stages defenders can better identify and stop attackers at each of the respective stages.