Slika:Intrusion Kill Chain - v2.png

Izvorna datoteka(950 × 681 točk, velikost datoteke: 158 KB, MIME-vrsta: image/png)


Understanding the graphic

Computer scientists at Lockheed-Martin corporation described in 2011 the usage of a new "intrusion kill chain" framework or model to defend computer networks.[1] They wrote that attacks may occur in stages and can be disrupted through controls established at each stage. The kill chain can also be used as a management tool to help continuously improve network defense. Threats must progress through seven stages in the model:

  • Reconnaissance: Intruder selects target, researches it, and attempts to identify vulnerabilities in the target network.
  • Weaponization: Intruder creates remote access malware weapon, such as a virus or worm, tailored to one or more vulnerabilities.
  • Delivery: Intruder transmits weapon to target (e.g., via e-mail attachments, websites or USB drives)
  • Exploitation: Malware weapon's program code triggers, which takes action on target network to exploit vulnerability.
  • Installation: Malware weapon installs access point (e.g., "backdoor") usable by intruder.
  • Command and Control: Malware enables intruder to have "hands on the keyboard" persistent access to target network.
  • Actions on Objective: Intruder takes action to achieve their goals, such as data exfiltration, data destruction, or encryption for ransom.

A U.S. Senate investigation of the 2013 Target Corporation data breach included analysis based on the Lockheed-Martin kill chain framework. It identified several stages where controls did not prevent or detect progression of the attack.[2]

References

Povzetek

Opis
English: Intrusion kill chain for information security
Datum
Vir http://www.public.navy.mil/spawar/Press/Documents/Publications/03.26.15_USSenate.pdf
Avtor U.S. Senate Committee on Commerce, Science, and Transportation

Licenca

Public domain
Ta datoteka je delo mornarja ali zaposlenega v Mornarici ZDA, posneto ali napravljeno v okviru njegovih uradnih dolžnosti. Kot delo Zvezne vlade ZDA je slika v javni domeni.

Napisi

Dodajte enovrstični opis, kaj ta datoteka predstavlja

Predmeti, prikazani v tej datoteki

motiv

26. marec 2014

Zgodovina datoteke

Kliknite datum in čas za ogled datoteke, ki je bila takrat naložena.

Datum in časSličicaVelikostUporabnikKomentar
trenutno19:24, 30. junij 2016Sličica za različico z datumom 19:24, 30. junij 2016950 × 681 (158 KB)FarcasterUser created page with UploadWizard

Datoteka je del naslednje 1 strani slovenske Wikipedije (strani drugih projektov niso navedene):

Globalna uporaba datoteke

To datoteko uporabljajo tudi naslednji vikiji:

Metapodatki