SlideShare a Scribd company logo
1 of 1
Download to read offline
Is kill chain preventive, detective or both?
Solution
both,
The Cyber Kill Chain is an intrusion-based method that allows us to focus on the different stages
of an attack . By implementing tools to prevent attacks at the different stages and identifying
attacks in various stages, both detective and preventive measures can be used with kill chain
method.
By investing tools like suricata, a corporation will notice attacks earlier in
the kill chain and stop AN attacker from establishing a foothold in one’s network. Once
an attacker has established a foothold within the environment, AN attacker is very
patient in accomplishing their mission. rather than solely police investigation attacks that reach
the
command and management stage of the kill chain, organizations ought to look into stopping
these
attacks earlier within the chain and start to maneuver towards a proactive defense with layered
preventative and detective technologies. there's no solution in cybersecurity, but
utilizing the defense-in-depth strategy can facilitate secure one’s surroundings from a range
of attackers.

More Related Content

Similar to Is kill chain preventive, detective or bothSolutionboth,The.pdf

Get Benefit From Threat Intelligence
Get Benefit From Threat IntelligenceGet Benefit From Threat Intelligence
Get Benefit From Threat IntelligenceSOCVault
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentSaikat Chaudhuri
 
201408 fire eye korea user event press roundtable
201408 fire eye korea user event   press roundtable201408 fire eye korea user event   press roundtable
201408 fire eye korea user event press roundtableJunSeok Seo
 
Cyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter Solutions Cyber Security Company Canada.pdfCyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter Solutions Cyber Security Company Canada.pdfCyberhunter Cyber Security
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceTony Zirnoon, CISSP
 
The Pros and Cons of Different Security Detection Technologies.pdf
The Pros and Cons of Different Security Detection Technologies.pdfThe Pros and Cons of Different Security Detection Technologies.pdf
The Pros and Cons of Different Security Detection Technologies.pdfSecurityDetectionSol
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosecCMR WORLD TECH
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosecErfan Mallick
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical HackingJennifer Wood
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALMichael Bunn
 
ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guideMatt Ford
 
RED-TEAM_Conclave
RED-TEAM_ConclaveRED-TEAM_Conclave
RED-TEAM_ConclaveNSConclave
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
Red Team vs. Blue Team
Red Team vs. Blue TeamRed Team vs. Blue Team
Red Team vs. Blue TeamEC-Council
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSahithi Naraparaju
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfHow Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfWebtrills1
 

Similar to Is kill chain preventive, detective or bothSolutionboth,The.pdf (20)

Cisco - See Everything, Secure Everything
Cisco - See Everything, Secure EverythingCisco - See Everything, Secure Everything
Cisco - See Everything, Secure Everything
 
Get Benefit From Threat Intelligence
Get Benefit From Threat IntelligenceGet Benefit From Threat Intelligence
Get Benefit From Threat Intelligence
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN Environment
 
201408 fire eye korea user event press roundtable
201408 fire eye korea user event   press roundtable201408 fire eye korea user event   press roundtable
201408 fire eye korea user event press roundtable
 
Cyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter Solutions Cyber Security Company Canada.pdfCyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter Solutions Cyber Security Company Canada.pdf
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_Finance
 
The Pros and Cons of Different Security Detection Technologies.pdf
The Pros and Cons of Different Security Detection Technologies.pdfThe Pros and Cons of Different Security Detection Technologies.pdf
The Pros and Cons of Different Security Detection Technologies.pdf
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
 
Defense in Depth
Defense in DepthDefense in Depth
Defense in Depth
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINALDefending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
 
ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guide
 
RED-TEAM_Conclave
RED-TEAM_ConclaveRED-TEAM_Conclave
RED-TEAM_Conclave
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Red Team vs. Blue Team
Red Team vs. Blue TeamRed Team vs. Blue Team
Red Team vs. Blue Team
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfHow Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
 

More from info824691

In what ways are humans also primatesSolutionBoth humans and .pdf
In what ways are humans also primatesSolutionBoth humans and .pdfIn what ways are humans also primatesSolutionBoth humans and .pdf
In what ways are humans also primatesSolutionBoth humans and .pdfinfo824691
 
i need Understand the role of capillaries in fluidnutrient exchange.pdf
i need Understand the role of capillaries in fluidnutrient exchange.pdfi need Understand the role of capillaries in fluidnutrient exchange.pdf
i need Understand the role of capillaries in fluidnutrient exchange.pdfinfo824691
 
Give an explanation of the trait below. SolutionIt is dominant.pdf
Give an explanation of the trait below.  SolutionIt is dominant.pdfGive an explanation of the trait below.  SolutionIt is dominant.pdf
Give an explanation of the trait below. SolutionIt is dominant.pdfinfo824691
 
External decision makers would look primarily to financial accounting.pdf
External decision makers would look primarily to financial accounting.pdfExternal decision makers would look primarily to financial accounting.pdf
External decision makers would look primarily to financial accounting.pdfinfo824691
 
ecosystem ecologyTheme Physical Template of Terrestrial Environme.pdf
ecosystem ecologyTheme Physical Template of Terrestrial Environme.pdfecosystem ecologyTheme Physical Template of Terrestrial Environme.pdf
ecosystem ecologyTheme Physical Template of Terrestrial Environme.pdfinfo824691
 
Distribution of Resources Whether a resource is distributed evenly a.pdf
Distribution of Resources  Whether a resource is distributed evenly a.pdfDistribution of Resources  Whether a resource is distributed evenly a.pdf
Distribution of Resources Whether a resource is distributed evenly a.pdfinfo824691
 
Describe the mechanism of action of drugs effective against viral in.pdf
Describe the mechanism of action of drugs effective against viral in.pdfDescribe the mechanism of action of drugs effective against viral in.pdf
Describe the mechanism of action of drugs effective against viral in.pdfinfo824691
 
During Mitosis and Meiosis, describe how and where errors might be m.pdf
During Mitosis and Meiosis, describe how and where errors might be m.pdfDuring Mitosis and Meiosis, describe how and where errors might be m.pdf
During Mitosis and Meiosis, describe how and where errors might be m.pdfinfo824691
 
Define indirect finance, direct finance, debt, and equity.Solut.pdf
Define indirect finance, direct finance, debt, and equity.Solut.pdfDefine indirect finance, direct finance, debt, and equity.Solut.pdf
Define indirect finance, direct finance, debt, and equity.Solut.pdfinfo824691
 
Chapter 17 True False Questions 1. Hemostasis is the production of fo.pdf
Chapter 17 True False Questions 1. Hemostasis is the production of fo.pdfChapter 17 True False Questions 1. Hemostasis is the production of fo.pdf
Chapter 17 True False Questions 1. Hemostasis is the production of fo.pdfinfo824691
 
An object is placed 12.9 cm in front of the cornea. (The cornea is t.pdf
An object is placed 12.9 cm in front of the cornea. (The cornea is t.pdfAn object is placed 12.9 cm in front of the cornea. (The cornea is t.pdf
An object is placed 12.9 cm in front of the cornea. (The cornea is t.pdfinfo824691
 
An archaeal contaminant is discovered in a shipment of sausages. To .pdf
An archaeal contaminant is discovered in a shipment of sausages. To .pdfAn archaeal contaminant is discovered in a shipment of sausages. To .pdf
An archaeal contaminant is discovered in a shipment of sausages. To .pdfinfo824691
 
8. A box of parts contains 8 good items and 2 defective items. If 2 .pdf
8. A box of parts contains 8 good items and 2 defective items. If 2 .pdf8. A box of parts contains 8 good items and 2 defective items. If 2 .pdf
8. A box of parts contains 8 good items and 2 defective items. If 2 .pdfinfo824691
 
A microbiologist obtains two samples one of a virus and the other of.pdf
A microbiologist obtains two samples one of a virus and the other of.pdfA microbiologist obtains two samples one of a virus and the other of.pdf
A microbiologist obtains two samples one of a virus and the other of.pdfinfo824691
 
Can someone please explain part E to me. Its the only one I dont.pdf
Can someone please explain part E to me. Its the only one I dont.pdfCan someone please explain part E to me. Its the only one I dont.pdf
Can someone please explain part E to me. Its the only one I dont.pdfinfo824691
 
A two-way ANOVA with interaction has how many sources of variation.pdf
A two-way ANOVA with interaction has how many sources of variation.pdfA two-way ANOVA with interaction has how many sources of variation.pdf
A two-way ANOVA with interaction has how many sources of variation.pdfinfo824691
 
2. Start capturing packets then open a webpage. a. “Follow” the TCP .pdf
2. Start capturing packets then open a webpage. a. “Follow” the TCP .pdf2. Start capturing packets then open a webpage. a. “Follow” the TCP .pdf
2. Start capturing packets then open a webpage. a. “Follow” the TCP .pdfinfo824691
 
Bioinformatics sequencing excercise. Sequencing the human genome sta.pdf
Bioinformatics sequencing excercise. Sequencing the human genome sta.pdfBioinformatics sequencing excercise. Sequencing the human genome sta.pdf
Bioinformatics sequencing excercise. Sequencing the human genome sta.pdfinfo824691
 
Write a function in C++ to generate an N-node random binary search t.pdf
Write a function in C++ to generate an N-node random binary search t.pdfWrite a function in C++ to generate an N-node random binary search t.pdf
Write a function in C++ to generate an N-node random binary search t.pdfinfo824691
 
Write a paragraph introducing the immunology pertaining to Crohns D.pdf
Write a paragraph introducing the immunology pertaining to Crohns D.pdfWrite a paragraph introducing the immunology pertaining to Crohns D.pdf
Write a paragraph introducing the immunology pertaining to Crohns D.pdfinfo824691
 

More from info824691 (20)

In what ways are humans also primatesSolutionBoth humans and .pdf
In what ways are humans also primatesSolutionBoth humans and .pdfIn what ways are humans also primatesSolutionBoth humans and .pdf
In what ways are humans also primatesSolutionBoth humans and .pdf
 
i need Understand the role of capillaries in fluidnutrient exchange.pdf
i need Understand the role of capillaries in fluidnutrient exchange.pdfi need Understand the role of capillaries in fluidnutrient exchange.pdf
i need Understand the role of capillaries in fluidnutrient exchange.pdf
 
Give an explanation of the trait below. SolutionIt is dominant.pdf
Give an explanation of the trait below.  SolutionIt is dominant.pdfGive an explanation of the trait below.  SolutionIt is dominant.pdf
Give an explanation of the trait below. SolutionIt is dominant.pdf
 
External decision makers would look primarily to financial accounting.pdf
External decision makers would look primarily to financial accounting.pdfExternal decision makers would look primarily to financial accounting.pdf
External decision makers would look primarily to financial accounting.pdf
 
ecosystem ecologyTheme Physical Template of Terrestrial Environme.pdf
ecosystem ecologyTheme Physical Template of Terrestrial Environme.pdfecosystem ecologyTheme Physical Template of Terrestrial Environme.pdf
ecosystem ecologyTheme Physical Template of Terrestrial Environme.pdf
 
Distribution of Resources Whether a resource is distributed evenly a.pdf
Distribution of Resources  Whether a resource is distributed evenly a.pdfDistribution of Resources  Whether a resource is distributed evenly a.pdf
Distribution of Resources Whether a resource is distributed evenly a.pdf
 
Describe the mechanism of action of drugs effective against viral in.pdf
Describe the mechanism of action of drugs effective against viral in.pdfDescribe the mechanism of action of drugs effective against viral in.pdf
Describe the mechanism of action of drugs effective against viral in.pdf
 
During Mitosis and Meiosis, describe how and where errors might be m.pdf
During Mitosis and Meiosis, describe how and where errors might be m.pdfDuring Mitosis and Meiosis, describe how and where errors might be m.pdf
During Mitosis and Meiosis, describe how and where errors might be m.pdf
 
Define indirect finance, direct finance, debt, and equity.Solut.pdf
Define indirect finance, direct finance, debt, and equity.Solut.pdfDefine indirect finance, direct finance, debt, and equity.Solut.pdf
Define indirect finance, direct finance, debt, and equity.Solut.pdf
 
Chapter 17 True False Questions 1. Hemostasis is the production of fo.pdf
Chapter 17 True False Questions 1. Hemostasis is the production of fo.pdfChapter 17 True False Questions 1. Hemostasis is the production of fo.pdf
Chapter 17 True False Questions 1. Hemostasis is the production of fo.pdf
 
An object is placed 12.9 cm in front of the cornea. (The cornea is t.pdf
An object is placed 12.9 cm in front of the cornea. (The cornea is t.pdfAn object is placed 12.9 cm in front of the cornea. (The cornea is t.pdf
An object is placed 12.9 cm in front of the cornea. (The cornea is t.pdf
 
An archaeal contaminant is discovered in a shipment of sausages. To .pdf
An archaeal contaminant is discovered in a shipment of sausages. To .pdfAn archaeal contaminant is discovered in a shipment of sausages. To .pdf
An archaeal contaminant is discovered in a shipment of sausages. To .pdf
 
8. A box of parts contains 8 good items and 2 defective items. If 2 .pdf
8. A box of parts contains 8 good items and 2 defective items. If 2 .pdf8. A box of parts contains 8 good items and 2 defective items. If 2 .pdf
8. A box of parts contains 8 good items and 2 defective items. If 2 .pdf
 
A microbiologist obtains two samples one of a virus and the other of.pdf
A microbiologist obtains two samples one of a virus and the other of.pdfA microbiologist obtains two samples one of a virus and the other of.pdf
A microbiologist obtains two samples one of a virus and the other of.pdf
 
Can someone please explain part E to me. Its the only one I dont.pdf
Can someone please explain part E to me. Its the only one I dont.pdfCan someone please explain part E to me. Its the only one I dont.pdf
Can someone please explain part E to me. Its the only one I dont.pdf
 
A two-way ANOVA with interaction has how many sources of variation.pdf
A two-way ANOVA with interaction has how many sources of variation.pdfA two-way ANOVA with interaction has how many sources of variation.pdf
A two-way ANOVA with interaction has how many sources of variation.pdf
 
2. Start capturing packets then open a webpage. a. “Follow” the TCP .pdf
2. Start capturing packets then open a webpage. a. “Follow” the TCP .pdf2. Start capturing packets then open a webpage. a. “Follow” the TCP .pdf
2. Start capturing packets then open a webpage. a. “Follow” the TCP .pdf
 
Bioinformatics sequencing excercise. Sequencing the human genome sta.pdf
Bioinformatics sequencing excercise. Sequencing the human genome sta.pdfBioinformatics sequencing excercise. Sequencing the human genome sta.pdf
Bioinformatics sequencing excercise. Sequencing the human genome sta.pdf
 
Write a function in C++ to generate an N-node random binary search t.pdf
Write a function in C++ to generate an N-node random binary search t.pdfWrite a function in C++ to generate an N-node random binary search t.pdf
Write a function in C++ to generate an N-node random binary search t.pdf
 
Write a paragraph introducing the immunology pertaining to Crohns D.pdf
Write a paragraph introducing the immunology pertaining to Crohns D.pdfWrite a paragraph introducing the immunology pertaining to Crohns D.pdf
Write a paragraph introducing the immunology pertaining to Crohns D.pdf
 

Recently uploaded

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFVivekanand Anglo Vedic Academy
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppCeline George
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital ManagementMBA Assignment Experts
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MysoreMuleSoftMeetup
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfJerry Chew
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...Gary Wood
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxMarlene Maheu
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfcupulin
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................MirzaAbrarBaig5
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...Nguyen Thanh Tu Collection
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...EduSkills OECD
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportDenish Jangid
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 

Recently uploaded (20)

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 

Is kill chain preventive, detective or bothSolutionboth,The.pdf

  • 1. Is kill chain preventive, detective or both? Solution both, The Cyber Kill Chain is an intrusion-based method that allows us to focus on the different stages of an attack . By implementing tools to prevent attacks at the different stages and identifying attacks in various stages, both detective and preventive measures can be used with kill chain method. By investing tools like suricata, a corporation will notice attacks earlier in the kill chain and stop AN attacker from establishing a foothold in one’s network. Once an attacker has established a foothold within the environment, AN attacker is very patient in accomplishing their mission. rather than solely police investigation attacks that reach the command and management stage of the kill chain, organizations ought to look into stopping these attacks earlier within the chain and start to maneuver towards a proactive defense with layered preventative and detective technologies. there's no solution in cybersecurity, but utilizing the defense-in-depth strategy can facilitate secure one’s surroundings from a range of attackers.