fbpx
Wikipedia

Intrusion Kill Chain - v2

Faylın orijinalı(950 × 681 piksel, fayl həcmi: 158 KB, MIME növü: image/png)

Bu fayl "Vikimedia Commons"dadır
və digər layihələrdə istifadə edilə bilər.
Faylın təsvir səhifəsinə get

Understanding the graphic

Computer scientists at Lockheed-Martin corporation described in 2011 the usage of a new "intrusion kill chain" framework or model to defend computer networks. They wrote that attacks may occur in stages and can be disrupted through controls established at each stage. The kill chain can also be used as a management tool to help continuously improve network defense. Threats must progress through seven stages in the model:

  • Reconnaissance: Intruder selects target, researches it, and attempts to identify vulnerabilities in the target network.
  • Weaponization: Intruder creates remote access malware weapon, such as a virus or worm, tailored to one or more vulnerabilities.
  • Delivery: Intruder transmits weapon to target (e.g., via e-mail attachments, websites or USB drives)
  • Exploitation: Malware weapon's program code triggers, which takes action on target network to exploit vulnerability.
  • Installation: Malware weapon installs access point (e.g., "backdoor") usable by intruder.
  • Command and Control: Malware enables intruder to have "hands on the keyboard" persistent access to target network.
  • Actions on Objective: Intruder takes action to achieve their goals, such as data exfiltration, data destruction, or encryption for ransom.

A U.S. Senate investigation of the 2013 Target Corporation data breach included analysis based on the Lockheed-Martin kill chain framework. It identified several stages where controls did not prevent or detect progression of the attack.

References

  1. Lockheed-Martin Corporation-Hutchins, Cloppert, and Amin-Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains-2011
  2. U.S. Senate-Committee on Commerce, Science, and Transportation-A "Kill Chain" Analysis of the 2013 Target Data Breach-March 26, 2014

Xülasə

İzah
English: Intrusion kill chain for information security
Tarix
Mənbə http://www.public.navy.mil/spawar/Press/Documents/Publications/03.26.15_USSenate.pdf
Müəllif U.S. Senate Committee on Commerce, Science, and Transportation

Lisenziya

Captions

Add a one-line explanation of what this file represents

Items portrayed in this file

təsvir edir

yaranma tarixi

26 mart 2014

Faylın tarixçəsi

Faylın əvvəlki versiyasını görmək üçün gün/tarix bölməsindəki tarixlərə klikləyin.

Tarix/VaxtKiçik şəkilÖlçülərİstifadəçiŞərh
indiki17:24, 30 iyun 2016950 × 681 (158 KB)FarcasterUser created page with UploadWizard

Bu şəkilə olan keçidlər:

Faylın qlobal istifadəsi

Bu fayl aşağıdakı vikilərdə istifadə olunur:

  • Kill chain
  • User:Rajkiran g/sandbox
  • Metaməlumatlar

    fayl, intrusion, kill, chain, fayl, faylın, tarixçəsi, fayl, keçidləri, faylın, qlobal, istifadəsi, metaməlumatlarsınaq, göstərişi, ölçüsü, piksel, digər, ölçülər, piksel, piksel, piksel, faylın, orijinalı, 8206, piksel, fayl, həcmi, mime, növü, image, fayl, v. Fayl Faylin tarixcesi Fayl kecidleri Faylin qlobal istifadesi MetamelumatlarSinaq gosterisi olcusu 800 573 piksel Diger olculer 320 229 piksel 640 459 piksel 950 681 piksel Faylin orijinali 8206 950 681 piksel fayl hecmi 158 KB MIME novu image png Bu fayl Vikimedia Commons dadirve diger layihelerde istifade edile biler Faylin tesvir sehifesine get Mundericat 1 Understanding the graphic 2 References 3 Xulase 4 Lisenziya Understanding the graphic Computer scientists at Lockheed Martin corporation described in 2011 the usage of a new intrusion kill chain framework or model to defend computer networks 1 They wrote that attacks may occur in stages and can be disrupted through controls established at each stage The kill chain can also be used as a management tool to help continuously improve network defense Threats must progress through seven stages in the model Reconnaissance Intruder selects target researches it and attempts to identify vulnerabilities in the target network Weaponization Intruder creates remote access malware weapon such as a virus or worm tailored to one or more vulnerabilities Delivery Intruder transmits weapon to target e g via e mail attachments websites or USB drives Exploitation Malware weapon s program code triggers which takes action on target network to exploit vulnerability Installation Malware weapon installs access point e g backdoor usable by intruder Command and Control Malware enables intruder to have hands on the keyboard persistent access to target network Actions on Objective Intruder takes action to achieve their goals such as data exfiltration data destruction or encryption for ransom A U S Senate investigation of the 2013 Target Corporation data breach included analysis based on the Lockheed Martin kill chain framework It identified several stages where controls did not prevent or detect progression of the attack 2 References Lockheed Martin Corporation Hutchins Cloppert and Amin Intelligence Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains 2011 U S Senate Committee on Commerce Science and Transportation A Kill Chain Analysis of the 2013 Target Data Breach March 26 2014 Xulase IzahIntrusion Kill Chain v2 png English Intrusion kill chain for information security Tarix 26 mart 2014 Menbe http www public navy mil spawar Press Documents Publications 03 26 15 USSenate pdf Muellif U S Senate Committee on Commerce Science and Transportation Lisenziya Public domain Public domain false false This file is a work of a sailor or employee of the U S Navy taken or made as part of that person s official duties As a work of the U S federal government it is in the public domain in the United States This file has been identified as being free of known restrictions under copyright law including all related and neighboring rights https creativecommons org publicdomain mark 1 0 PDM Creative Commons Public Domain Mark 1 0 false falseCaptionsazerbaycancaAdd a one line explanation of what this file representsItems portrayed in this filetesvir ediryaranma tarixi26 mart 2014 Faylin tarixcesi Faylin evvelki versiyasini gormek ucun gun tarix bolmesindeki tarixlere klikleyin Tarix VaxtKicik sekilOlculerIstifadeciSerh indiki17 24 30 iyun 2016950 681 158 KB FarcasterUser created page with UploadWizard Fayl kecidleri Bu sekile olan kecidler Kiberhucum Kill chain Faylin qlobal istifadesi Bu fayl asagidaki vikilerde istifade olunur ar wikipedia org layihesinde istifadesi هجوم سيبراني en wikipedia org layihesinde istifadesi Cyberattack Kill chain User Rajkiran g sandbox fa wikipedia org layihesinde istifadesi حمله سایبری fr wikipedia org layihesinde istifadesi Kill chain securite informatique ja wikipedia org layihesinde istifadesi サイバーセキュリティ sl wikipedia org layihesinde istifadesi Kibernetski napadMetamelumatlar Bu faylda fotoaparat ve ya skanerle elave olunmus melumatlar var Eger fayl sonradan redakte olunubsa bezi parametrler bu sekilde gosterilenlerden ferqli ola biler Ufuqi xett47 24 dpcSaquli xett47 24 dpc Menbe https az wikipedia org wiki Fayl Intrusion Kill Chain v2 png, wikipedia, oxu, kitab, kitabxana, axtar, tap, hersey,

    ne axtarsan burda

    , en yaxsi meqale sayti, meqaleler, kitablar, oyrenmek, wiki, bilgi, tarix, seks, porno, indir, yukle, sex, azeri sex, azeri, seks yukle, sex yukle, izle, seks izle, porno izle, mobil seks, telefon ucun, chat, azeri chat, tanisliq, tanishliq, azeri tanishliq, sayt, medeni, medeni saytlar, chatlar, mekan, tanisliq mekani, mekanlari, yüklə, pulsuz, pulsuz yüklə, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, şəkil, muisiqi, mahnı, kino, film, kitab, oyun, oyunlar.