IS USING INTERNET SAFE?

The key to detecting and stopping computer intrusions is understanding how a cyberattack process works. This cycle, known as Cyber kill chain, establishes the steps that follow a cybercriminal to achieve its objective.
Knowing the seven phases of this chain is the best way to prevent a cyber-attack, as if caught intrusion in any of these stages, the sequence is broken and the attack would be blocked:Recognition: The
attacker collects information about his victim, observing the data that the
company publishes and investigating the technology that it uses. That is why it
is essential to limit the information that is shared on the network and on
social networks.
Preparation: In
this phase the attack is prepared by interacting with the objective. For
example, the cybercriminal could create an infected document and include it in
an email that impersonates a trusted person in the company.
Distribution: At this stage, the attack is transmitted, for
example, by opening the infected file that had previously been sent by
mail.
Exploitation: This
step supposes the materialization of the attack. It usually occurs by
exploiting a vulnerability for which a security patch already exists. This is
why it is so important to keep all systems up to date.
Installation: It is
the phase in which the cybercriminal installs the malware or malicious program
on the target. Some attacks, such as credential theft, do not require
installation.
Command and control: At this point, the attacker takes control of
the system and carries out actions that compromise the victim's privacy: theft
of confidential documentation, theft of credentials, etc.
Actions on the objectives:
In the last stage, the cybercriminal seizes the data of his victim and tries to
expand his attack to more targets.
The Cyber kill chain is a
cyclical process, because if the attacker reaches the last stage can reach new
victims and continuous chain. To break it, we must stay up-to-date and take internet
security measures to protect our computers.
Comments
Post a Comment