top of page
Search

Cyber Kill chain & MITRE ATTACK Framework

  • kkalvani
  • Oct 23, 2024
  • 1 min read

Here are my insights on this informative diagram I came across. I highly recommend the read.


Slide 1, contains two parts. 


1) Are steps to counter a cyber-attack.


2) Are different types of threat actors mapped with their respective typical end goal.



Identifying the kind of threat actors can help us counter or even prevent an attack from one of these actors.


Here is the most interesting part of this post, the 2nd slide - THE MITRE ATT&CK i.e., the detailed process of what an attacker usually does to harm our systems using a combination of cyber-attacks like DDos, brute force, backdoor, etc, in order to get what they want. It's a model that breaks down these behaviors into distinct phases, providing insights into their tactics, techniques, and procedures.


It clearly shows how long each stage would take and that an attack can last for months and we may not be able to even detect it.


Knowing what a typical attacker would do, would help us cybersecurity professionals prevent or counter these kinds of attacks and enhance their cybersecurity strategies by understanding and mitigating potential threats effectively. This post (the model) gives us the knowledge to do that.


Diagram Credit: Michael Cipollone



ree

 
 
 

Comments


bottom of page