Using the Cybersecurity Kill Chain for Attack and Defence

被引:2
|
作者
Cooper M.
机构
关键词
D O I
10.1093/itnow/bwac052
中图分类号
学科分类号
摘要
Professor Ali Al-Sherbaz and Dr Qublai Ali-Mirza from the University of Gloucestershire tell Martin Cooper MBCS how understanding the key phases of cyber attacks can keep an organisation safe. Cyber crime is a business - and a lucrative one at that. We hear about organisations being robbed and blackmailed, oftentimes for millions of dollars, pounds and cryptocurrencies.
引用
收藏
页码:38 / 41
页数:3
相关论文
共 50 条
  • [1] Severity-based triage of cybersecurity incidents using kill chain attack graphs
    Sadlek, Lukas
    Yamin, Muhammad Mudassar
    Celeda, Pavel
    Katt, Basel
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [2] Identification of Attack Paths Using Kill Chain and Attack Graphs
    Sadlek, Lukas
    Celeda, Pavel
    Tovarnak, Daniel
    PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [3] Using an Improved Cybersecurity Kill Chain to Develop an Improved Honey Community
    Rutherford, James R.
    White, Gregory B.
    PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 2624 - 2632
  • [4] Modelling cybersecurity strategies with game theory and cyber kill chain
    Kour, Ravdeep
    Karim, Ramin
    Dersin, Pierre
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2025,
  • [5] Artificial Intelligence in Cybersecurity: The Use of AI Along the Cyber Kill Chain
    Chomiak-Orsa, Iwona
    Rot, Artur
    Blaicke, Bartosz
    COMPUTATIONAL COLLECTIVE INTELLIGENCE, PT II, 2019, 11684 : 406 - 416
  • [6] Heuristic multistep attack scenarios construction based on kill chain
    Jie C.
    Ru Z.
    Jiahui W.
    Chen L.
    Zhishuai L.
    Bingjie L.
    Ang X.
    Journal of China Universities of Posts and Telecommunications, 2023, 30 (05): : 61 - 71
  • [7] Kill Chain Attack Modelling for Hidden Channel Attack Scenarios in Industrial Control Systems
    Neubert, Tom
    Vielhauer, Claus
    IFAC PAPERSONLINE, 2020, 53 (02): : 11074 - 11080
  • [8] Heuristic multistep attack scenarios construction based on kill chain
    Cheng Jie
    Zhang Ru
    Wei Jiahui
    Lu Chen
    Lü Zhishuai
    Lin Bingjie
    Xia Ang
    The Journal of China Universities of Posts and Telecommunications, 2023, 30 (05) : 61 - 71
  • [9] Creation of a DDOS attack using HTTP-GET Flood with the Cyber Kill Chain methodology
    Eleazar Martinez-Lozano, Jeferson
    Sandino Atencio-Ortiz, Pedro
    REVISTA ITECKNE, 2019, 16 (01): : 41 - 47
  • [10] Using Multiplex Networks to Model Cybersecurity Attack Profiles
    Pillai, Manesh
    Karabatis, George
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2016 CONFERENCES, 2016, 10033 : 918 - 933