Cyber Kill Chain
A cyber kill chain is a collection of processes related to the use of cyberattacks on systems.
Cyber kill chain. Similar in concept to the military s model it defines the steps used by cyber attackers in today s cyber based attacks. The cyber kill chain is a sequence of stages required for an attacker to successfully infiltrate a network and exfiltrate data from it. The theory is that by understanding each of these stages defenders can better identify and stop attackers at each of the respective stages. Developed by lockheed martin the cyber kill chain framework is part of the intelligence driven defense model for identification and prevention of cyber intrusions activity.
The actual steps in a kill chain trace the typical stages of a cyber attack from early reconnaissance to completion where the intruder. Each stage demonstrates a specific goal along the attacker s path. In 2011 lockheed martin released a paper defining a cyber kill chain. Designing your monitoring and response plan around the cyber kill chain model is an effective method because it focuses on.
The cyber kill chain is a dynamic and intuitive model that describes the behavior of a malicious actor in his attempt to penetrate an infrastructure for the purpose of data exfiltration. The military kill chain f2t2ea. The theory is that by understanding each of these stages defenders can better. First of all let me define cyber kill chain the steps used by cyber attackers in today s cyber based attacks.
Understanding the cyber attack chain model can help it security teams put strategies and technologies in place to kill or contain the attack at various stages and better protect the it ecosystem. Some experts describe the cyber kill chain as representing the stages of a cyberattack. In general the cyber kill chain is a step by step description of what a complex attack does. The cyber kill chain is a series of steps that trace stages of a cyberattack from the early reconnaissance stages to the exfiltration of data.
A kill chain is used to describe the various stages of a cyber attack as it pertains to network security the actual model the cyber kill chain framework was developed by lockheed martin and is used for identification and prevention of cyber intrusions. One military kill chain model is the. The cyber attack chain also referred to as the cyber kill chain is a way to understand the sequence of events involved in an external attack on an organization s it environment. The kill chain helps us understand and combat ransomware security breaches and advanced persistent attacks apts.
The model identifies what the adversaries must complete in order to achieve their objective.