Cyber kill Chain is idea presented by Lockheed Martin which describe the targeted attacks so that organization’s networks can be protected. It includes seven stages which are reconnaissance, weaponization, delivery, exploit, installation, command and control, and actions. Two processes have been discussed in this paper which includes reconnaissance and weaponization. Reconnaissance is the phase where the offenders are attempting to choose what are (and are) bad targets. Weaponization is the place the offenders make an apparatus to assault their picked target, utilizing the data they have assembled, and put it to malignant use. The purpose of the paper is to elaborate the steps and they have been investigated in this paper.
History and Introduction:
In case you’re one of those people who read a considerable measure of InfoSec news, you’ve most likely heard a great deal of notice of the viability of a Cyber Kill Chain way to deal with security.
On the off chance that you figured out how to miss the commotion, you may be thinking about whether that is the most recent science fiction motion picture featuring the standard muscle-bound activity legend. In this article we’ll discuss what a Cyber Kill Chain methodology is, and whether it may be a solid match for your association. In military speech, a “Kill Chain” is a stage based model to portray the phases of an assault, which likewise illuminates approaches to counteract such assaults (Ranum, 2014).
Cyber kill chain:
Cyber kill Chain is idea presented by Lockheed Martin which describe the targeted attacks so that organization’s networks can be protected. It includes seven stages which are reconnaissance, weaponization, delivery, exploit, installation, command and control, and actions (Myers, 2013). In this paper, two stages of cyber kill chain named as reconnaissance and weaponization have been explained.
Details with examples about the two processes:
Two processes which have been explained in these pages include Reconnaissance and Weaponization and then both processes have been explained below.
This is the phase where the offenders are attempting to choose what are (and are) bad targets. All things considered, they attempt to discover what they can about your assets and your system to figure out if it is justified regardless of the exertion. In a perfect world, they might want an objective that is generally unguarded and with important information. What data the culprits can discover about your organization, and how it may be utilized, could shock you. Organizations regularly have more data accessible than they understand. Are names and contact points of interest of your representatives online? (Engel, 2014)
These stages are the place the offenders make an apparatus to assault their picked target, utilizing the data they have assembled, and put it to malignant use. The more data they can utilize, the all the more convincing a social designing assault can be. They could utilize lance phishing to access inner corporate assets with the data they found on your worker’s LinkedIn page. Alternately they could put a remote access Trojan into a document that seems to have essential data on an up and coming occasion keeping in mind the end goal to lure its beneficiary into running it. In the event that they comprehend what programming your clients or servers run, including OS form and sort, they can improve the probability of having the capacity to endeavor and introduce something inside of your system (Assante & Lee, 2015). These layers of barrier are the place your standard security wonk counsel comes in. Is your product a la mode? (No truly, every last bit of it, on each machine. Most organizations have that one box in some back room that is as yet running Windows 98. On the off chance that it’s ever associated with the Internet, it’s similar to having an appreciated mat outside your entryway.)
Conclusion and my personal opinion/view:
In the event that you don’t as of now have security and ability to perceive incorporated with your professional workplace, this may appear like an outlandish slope to climb. However, actualizing a Cyber Kill Chain doesn’t need to be done overnight. Take littler measures, finishing stages as you are capable. Do a check of your web vicinity to see what data it could give an assailant. Have each of your destinations do a stock of all PCs so you can redesign every one of them. Actualize layered security to diminish the likelihood that dangers will sneak past unnoticed. Make an arrangement for managing malware occasions. Instruct your staff about what to do with unforeseen, suspicious messages. With every stride taken, you’ll get more data about your surroundings. What’s more, the more data you have, the more probable you will have the capacity to distinguish atypical conduct.
Assante, M. J., & Lee, R. M. (2015). The Industrial Control System Cyber Kill Chain. Retrieved December 7, 2015, from https://www.sans.org/reading-room/whitepapers/ICS/industrial-control-system-cyber-kill-chain-36297
Engel, G. (2014). Deconstructing The Cyber Kill Chain. Retrieved December 7, 2015, from http://www.darkreading.com/attacks-breaches/deconstructing-the-cyber-kill-chain/a/d-id/1317542
Myers, L. (2013). Cyber Kill Chain is a Great Idea, But is It Something Your Company Can Implement? Retrieved December 7, 2015, from http://resources.infosecinstitute.com/cyber-kill-chain-is-a-great-idea-but-is-it-something-your-company-can-implement/
Ranum, M. J. (2014). Breaking Cyber Kill Chains. Retrieved December 7, 2015, from https://www.tenable.com/blog/breaking-cyber-kill-chains