...
首页> 外文期刊>Software world >Knowing Your Attacker -A Guide to the Cyber Kill Chain
【24h】

Knowing Your Attacker -A Guide to the Cyber Kill Chain

机译:了解攻击者-网络杀伤链指南

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Today's attackers are becoming increasingly sophisticated, using advanced techniques to infiltrate a business's environment. Unlike in the past when hackers primarily worked alone using "smash-and-grab" techniques, today's attackers prefer to work in groups, with each member bringing his or her own expertise. With highly skilled players in place, these groups are able to approach infiltration in a much more regimented way, following a defined process that enables then to evade detection and achieve their ultimate goal: turning sensitive, valuable data into a profit. With attackers ready to pounce on any business at any moment, how can businesses stay ahead and ensure their sensitive data remains safe? Most attacks follow a 'process' that identified attackers' behaviours, ranging from researching, to launching an attack and ultimately to data exfiltration: this is articulated as the "Cyber Kill Chain".
机译:如今,攻击者使用先进的技术渗透到企业环境中,变得越来越老练。与过去的黑客主要使用“粉碎和抢夺”技术单独工作不同,如今的攻击者更喜欢分组合作,每个成员都拥有自己的专业知识。有了熟练的参与者,这些小组就能按照定义好的过程以更有规则的方式进行渗透,从而逃避检测并实现其最终目标:将敏感,有价值的数据转化为利润。随着攻击者随时准备攻击任何企业,企业如何才能保持领先地位并确保其敏感数据保持安全?大多数攻击都遵循一个“过程”,该过程确定了攻击者的行为,包括研究,发起攻击以及最终到数据泄露:这被明确称为“网络杀伤链”。

著录项

  • 来源
    《Software world》 |2016年第2期|13-14|共2页
  • 作者

    Richard Cassidy;

  • 作者单位
  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号