Using the Cybersecurity Kill Chain for Attack and Defence

被引:2
|
作者
Cooper M.
机构
关键词
D O I
10.1093/itnow/bwac052
中图分类号
学科分类号
摘要
Professor Ali Al-Sherbaz and Dr Qublai Ali-Mirza from the University of Gloucestershire tell Martin Cooper MBCS how understanding the key phases of cyber attacks can keep an organisation safe. Cyber crime is a business - and a lucrative one at that. We hear about organisations being robbed and blackmailed, oftentimes for millions of dollars, pounds and cryptocurrencies.
引用
收藏
页码:38 / 41
页数:3
相关论文
共 50 条
  • [31] A heuristic multi-step attack model generation method based on kill chain model
    Liu, Jianyi
    Lu, Chen
    Lin, Bingjie
    Guo, Han
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2021, 128 : 36 - 37
  • [32] Extracting network based attack narratives through use of the cyber kill chain: A replication study
    Weathersby, Aaron
    Washington, Mark
    IT-INFORMATION TECHNOLOGY, 2022, 64 (1-2): : 29 - 42
  • [33] Attack is the best form of defence
    Andrew Jermy
    Nature Reviews Microbiology, 2012, 10 : 311 - 311
  • [34] Attack is the best form of defence
    Jermy, Andrew
    NATURE REVIEWS MICROBIOLOGY, 2012, 10 (05) : 311 - 311
  • [35] Sham trusts: attack and defence
    Fordham, John
    TRUSTS & TRUSTEES, 2005, 11 (08) : 19 - 22
  • [36] Attack, Defence, and Contagion in Networks
    Goyal, Sanjeev
    Vigier, Adrien
    REVIEW OF ECONOMIC STUDIES, 2014, 81 (04): : 1518 - 1542
  • [37] Political games of attack and defence
    De Dreu, Carsten K. W.
    Pliskin, Ruthie
    Rojek-Giffin, Michael
    Meder, Zsombor
    Gross, Jorg
    PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY B-BIOLOGICAL SCIENCES, 2021, 376 (1822)
  • [38] The defence of conservation is not an attack on the poor
    Sanderson, S
    Redford, K
    ORYX, 2004, 38 (02) : 146 - 147
  • [39] Clouds in the Kill Chain
    Passeri, Paolo
    ITNOW, 2019, 61 (04) : 38 - 39
  • [40] KILL SIGNALS THAT ATTACK MEASUREMENT DATA
    NALLE, DH
    INSTRUMENTS & CONTROL SYSTEMS, 1977, 50 (02): : 35 - 39