SlideShare a Scribd company logo
1 of 2
Download to read offline
Please read and offer commentary on the Cyber Kill Chain as its relevance to Incident Response and any
enhancements you might offer. It was initially designed for intrusions, can it be expanded to other cyber
threats?
The Cyber Kill Chain method is a process that details the event of a cyber-attack from the
initial state until the ending results. There are seven stages of this method, each which respond to
an event that has already happened. The seven stages of the CKC is reconnaissance,
weaponization, delivery, exploitation, instillation, command and control, and actions and
objectives. Each of these steps occur in that order and attempt to detect, deny, disrupt, degrade,
deceive, or destroy functions of the attack. The chain of events are complex and unique in its
recovery process.
The first process of the cyber kill chain is reconnaissance. This is the process of an
attacker surveying the network to find where the holes are. There is often areas where an attacker
can figure out how to get in and some are more obvious than others. In order to prevent this, you
want to survey your own system so that you can notice it before the wrong person does. A great
way in doing this is to log all of the users’ activity on the network. The second stage is
weaponization. This is where the attacker forms the attack. In this instance it is common that
malware is linked to apps or files that users have to access. It is often hidden but have to later be
activated. An example of this is social engineering and phishing emails. These are among the
most common ones. The third portion of the process is delivery. Following the creation of the
weapon for the attack,
Delivery- In this stage, the attacker delivers the weapon to the targeted machine. In this instance,
the machine can still be safe because it is only presented to the user. This is when users must
make good judgement on what to click, and what can potentially harm their machine. Within the
example, the client sent their bank teller an email which had a form attached. This form was
meant to show the teller information for the days withdraw, but also contained malware. The
bank teller did not use proper caution when opening files from clients, and downloaded it with
no hesitation. Once the file was downloaded, instantly the client knew he would be able to
exploit the system.
Exploitation- This is the portion where the program of the attack is triggered. It acts on the
network and is initiated. It is important for there to be policy restrictions so that it is not as easily
executed.
This study source was downloaded by 100000794300189 from CourseHero.com on 12-12-2021 15:46:44 GMT -06:00
https://www.coursehero.com/file/31240940/cyber-kill-chaindocx/
Instillation- This step is where the intruder installs the attack and gains access. This is a back
door process that the user is unaware of when it may occur and where to search for it. However,
this is why scans should be done often on the network to search for unusual activity. If the
attacker is caught in this stage, there is a chance that the information has not already been
compromised. Time is vital in the instance of an intrusion.
Command and Control- This stage is where the attacker is able to access the machine as if it
has hands on the computer. They can reach all documents, files, the entire system. In this
instance, it is important for preventative measures to have information encrypted and password
protected. Once an attacker can access the machine, if it is password protected in certain areas,
there are roadblocks to their attack. Also, in the instance that there is encrypted information, it
would be more difficult for them to decode it. Within the example, the lax anti-virus software on
the machines did not enforce such security measures. The system was open and completely
vulnerable for the attacker to exploit. The example explains how security cameras were then used
to access the machines that were not on the network.
Actions and Objective- This is where the attacker takes actions to achieve their intrusion goal.
This is where data is extracted, destroyed, and or encrypted for ransom. In this event, the system
has been completely exploited. There are a few measures one may do to prevent the entire
system from being accessed. You may disrupt the outbound traffic or even interfere within the
control of the attacker. The best bet is to have a segmented network in order to hold the attacker
to one section that it originally accessed. Within the example, the attacker was then able to insert
a dirty USB to the air-gapped machine machine to extract all other files. This step made
impossible for them to regain full access to files.
These steps can be used for any type of prevention or even solution to recovering from an attack.
Figure 2 breaks them down into a chart for a visual of how it all works.
This study source was downloaded by 100000794300189 from CourseHero.com on 12-12-2021 15:46:44 GMT -06:00
https://www.coursehero.com/file/31240940/cyber-kill-chaindocx/
Powered by TCPDF (www.tcpdf.org)

More Related Content

Similar to Cyber kill chain.docx

Part 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdfPart 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdf
fashiionbeutycare
 
ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guide
Matt Ford
 

Similar to Cyber kill chain.docx (20)

Adaptive Defense - Understanding Cyber Attacks
Adaptive Defense - Understanding Cyber AttacksAdaptive Defense - Understanding Cyber Attacks
Adaptive Defense - Understanding Cyber Attacks
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdf
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptx
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
IRJET-Ethical Hacking
IRJET-Ethical HackingIRJET-Ethical Hacking
IRJET-Ethical Hacking
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
Part 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdfPart 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdf
 
Unit 7
Unit 7Unit 7
Unit 7
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guide
 
Application security
Application securityApplication security
Application security
 
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security EnhancementDemystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
I0516064
I0516064I0516064
I0516064
 

More from Kestone (17)

Wk 8 la_complete.docx
Wk 8 la_complete.docxWk 8 la_complete.docx
Wk 8 la_complete.docx
 
Power point template (2)
Power point template (2)Power point template (2)
Power point template (2)
 
Order #944473372
Order #944473372Order #944473372
Order #944473372
 
359763713 other rev
359763713 other rev359763713 other rev
359763713 other rev
 
Bmgt380 learning activity(original)
Bmgt380 learning activity(original)Bmgt380 learning activity(original)
Bmgt380 learning activity(original)
 
Order #944473373
Order #944473373Order #944473373
Order #944473373
 
Paper4
Paper4Paper4
Paper4
 
Order #944473372 (1)
Order #944473372 (1)Order #944473372 (1)
Order #944473372 (1)
 
Sense of belonging
Sense of belongingSense of belonging
Sense of belonging
 
Fa21 essay 3 fem lit theory prompt 2
Fa21 essay 3 fem lit theory prompt 2Fa21 essay 3 fem lit theory prompt 2
Fa21 essay 3 fem lit theory prompt 2
 
Bmgt 380 project_ii_joshua_shipman_.docx
Bmgt 380 project_ii_joshua_shipman_.docxBmgt 380 project_ii_joshua_shipman_.docx
Bmgt 380 project_ii_joshua_shipman_.docx
 
Phc372 paper assignment(3)
Phc372 paper assignment(3)Phc372 paper assignment(3)
Phc372 paper assignment(3)
 
Phc 314
Phc 314Phc 314
Phc 314
 
Phc 314 paper assignment 1 7 ke eman al anizy
Phc 314 paper assignment 1 7 ke eman al anizyPhc 314 paper assignment 1 7 ke eman al anizy
Phc 314 paper assignment 1 7 ke eman al anizy
 
Phc 314 paper assignment 1
Phc 314 paper assignment 1Phc 314 paper assignment 1
Phc 314 paper assignment 1
 
Phc 151 assignment (1) 202110
Phc 151 assignment (1) 202110Phc 151 assignment (1) 202110
Phc 151 assignment (1) 202110
 
Assignment 1 week-4
Assignment 1 week-4Assignment 1 week-4
Assignment 1 week-4
 

Recently uploaded

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 

Recently uploaded (20)

Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDINGPuri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
 
Chandrapur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Chandrapur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableChandrapur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Chandrapur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableNanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
SRI GANGANAGAR 💋 Call Girl 9827461493 Call Girls in Escort service book now
SRI GANGANAGAR 💋 Call Girl 9827461493 Call Girls in  Escort service book nowSRI GANGANAGAR 💋 Call Girl 9827461493 Call Girls in  Escort service book now
SRI GANGANAGAR 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Bankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Available
Bankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service AvailableBankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Available
Bankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Available
 
Solan Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Solan Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableSolan Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Solan Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
JHARSUGUDA CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JHARSUGUDA ESCORTS
JHARSUGUDA CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JHARSUGUDA ESCORTSJHARSUGUDA CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JHARSUGUDA ESCORTS
JHARSUGUDA CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JHARSUGUDA ESCORTS
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 

Cyber kill chain.docx

  • 1. Please read and offer commentary on the Cyber Kill Chain as its relevance to Incident Response and any enhancements you might offer. It was initially designed for intrusions, can it be expanded to other cyber threats? The Cyber Kill Chain method is a process that details the event of a cyber-attack from the initial state until the ending results. There are seven stages of this method, each which respond to an event that has already happened. The seven stages of the CKC is reconnaissance, weaponization, delivery, exploitation, instillation, command and control, and actions and objectives. Each of these steps occur in that order and attempt to detect, deny, disrupt, degrade, deceive, or destroy functions of the attack. The chain of events are complex and unique in its recovery process. The first process of the cyber kill chain is reconnaissance. This is the process of an attacker surveying the network to find where the holes are. There is often areas where an attacker can figure out how to get in and some are more obvious than others. In order to prevent this, you want to survey your own system so that you can notice it before the wrong person does. A great way in doing this is to log all of the users’ activity on the network. The second stage is weaponization. This is where the attacker forms the attack. In this instance it is common that malware is linked to apps or files that users have to access. It is often hidden but have to later be activated. An example of this is social engineering and phishing emails. These are among the most common ones. The third portion of the process is delivery. Following the creation of the weapon for the attack, Delivery- In this stage, the attacker delivers the weapon to the targeted machine. In this instance, the machine can still be safe because it is only presented to the user. This is when users must make good judgement on what to click, and what can potentially harm their machine. Within the example, the client sent their bank teller an email which had a form attached. This form was meant to show the teller information for the days withdraw, but also contained malware. The bank teller did not use proper caution when opening files from clients, and downloaded it with no hesitation. Once the file was downloaded, instantly the client knew he would be able to exploit the system. Exploitation- This is the portion where the program of the attack is triggered. It acts on the network and is initiated. It is important for there to be policy restrictions so that it is not as easily executed. This study source was downloaded by 100000794300189 from CourseHero.com on 12-12-2021 15:46:44 GMT -06:00 https://www.coursehero.com/file/31240940/cyber-kill-chaindocx/
  • 2. Instillation- This step is where the intruder installs the attack and gains access. This is a back door process that the user is unaware of when it may occur and where to search for it. However, this is why scans should be done often on the network to search for unusual activity. If the attacker is caught in this stage, there is a chance that the information has not already been compromised. Time is vital in the instance of an intrusion. Command and Control- This stage is where the attacker is able to access the machine as if it has hands on the computer. They can reach all documents, files, the entire system. In this instance, it is important for preventative measures to have information encrypted and password protected. Once an attacker can access the machine, if it is password protected in certain areas, there are roadblocks to their attack. Also, in the instance that there is encrypted information, it would be more difficult for them to decode it. Within the example, the lax anti-virus software on the machines did not enforce such security measures. The system was open and completely vulnerable for the attacker to exploit. The example explains how security cameras were then used to access the machines that were not on the network. Actions and Objective- This is where the attacker takes actions to achieve their intrusion goal. This is where data is extracted, destroyed, and or encrypted for ransom. In this event, the system has been completely exploited. There are a few measures one may do to prevent the entire system from being accessed. You may disrupt the outbound traffic or even interfere within the control of the attacker. The best bet is to have a segmented network in order to hold the attacker to one section that it originally accessed. Within the example, the attacker was then able to insert a dirty USB to the air-gapped machine machine to extract all other files. This step made impossible for them to regain full access to files. These steps can be used for any type of prevention or even solution to recovering from an attack. Figure 2 breaks them down into a chart for a visual of how it all works. This study source was downloaded by 100000794300189 from CourseHero.com on 12-12-2021 15:46:44 GMT -06:00 https://www.coursehero.com/file/31240940/cyber-kill-chaindocx/ Powered by TCPDF (www.tcpdf.org)