Analysis of Cyber Kill Chain Causes Essay (Article)

Exclusively available on IvyPanda Available only on IvyPanda

Introduction

The Cyber Kill Chain provides a broad outline as a component of the intelligence-driven defense model. With the emergence of the Internet, the world has witnessed the arrival of cybersecurity threats that jeopardize both individual and organizational databases. As such, cybersecurity experts have designed a set of differentiated solutions for the detection and mitigation of intrusions. The Cyber Kill Chain is a tool that was specifically created by Lockheed Martin Company, a consortium specializing in manufacturing aerospace, artilleries, security, and advanced technologies in the United States (Kiwia et al., 2018). As such, the program highlights seven significant steps involved in the identification and alleviation of risks associated with cybersecurity (Cho et al., 2018). However, this paper analyzes the seventh step, actions on the objective, where the intruder gains relentless access, finally decides to fulfill their purpose, and proposes a countermeasure for this activity.

We will write a custom essay on your topic a custom Article on Analysis of Cyber Kill Chain Causes
808 writers online

Action on Objectives Required Tools

“Action on Objectives” is usually the last process in the Cyber Kill Chain initiative. Once the computer criminal gains entry into a system, they complete the objectives. At this point, an organization’s skilled workforce of human sensors can vastly enhance the company’s ability to determine and effectively respond to an episode, massively improving the corporation’s resilience capabilities (Cho et al., 2018). Defenders need to discover this stage as quickly as possible and deploy various tools that facilitate forensic evidence collection. For example, network packet captures can be implemented in the process to aid in damage assessment (Mahdavifar & Ghorbani, 2019). At this point, after advancing through the first six stages, can attackers decide to complete their initial objectives. Therefore, data exfiltration aims to gather, encode, and obtain information from the target’s environment. Other significant implements that can be utilized in this stage are the end-point security tools (Lezzi et al., 2018). For example, BitDefender is an excellent choice for businesses that value identification of malware, performance, and full reinforcement of databases.

How to Countermeasure this Activity

Having understood the significant aspects associated with the “action on objectives” stage of the kill chain process, organizations can implement various counterstrategies to mitigate the risks associated with cyber threats. First, a Chief Information Security Officer (CISO) can consider jamming communication with suspicious and risk Uniform Resource Locators (URLs). In particular, this strategy is referred to as URL filtering, which restricts access by conducting a comparison of Internet traffic to a data center to limit workers from accessing unsafe sites such as phishing websites (Lezzi et al., 2018). In addition, the CISO can also consider delineating guidelines and privileges to file transfer credible and regulated networks, thereby aiding in eliminating efforts to transmit data covertly. Lastly, the CISO should also take the initiative in advocating for secure behaviors, which will prevent a successful adversary from jeopardizing the organization’s databases (Li et al., 2019). In particular, the security officer should promote strong and differentiated passwords, authorize employees before sharing sensitive information, and examine their login patterns.

Conclusion

Cybersecurity is a critical aspect of modern-day business operations, and it should not be overlooked. Lockheed Martin Corporation developed the Cyber Kill Chain program specifically to assist organizations in detecting and countering cyber intrusions. This paper focused on analyzing the last step of this initiative, “action on objectives,” and identified various tools that can be used to mitigate risks. Moreover, the paper also suggested multiple ways for a security officer to alleviate the risks associated with cyber intrusions. In essence, organizations should implement the strategies identified above to prevent the repercussion of unauthorized access to their databases.

References

Cho, S., Han, I., Jeong, H., Kim, J., Koo, S., Oh, H., & Park, M. (2018). 2018 International Conference on Cyber Situational Awareness, Data Analytics, and Assessment (Cyber SA), 1–8. Web.

Kiwia, D., Dehghantanha, A., Choo, K.-K. R., & Slaughter, J. (2018). Journal of Computational Science, 27, 394–409. Web.

Lezzi, M., Lazoi, M., & Corallo, A. (2018).Computers in Industry, 103, 97–110. Web.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019).International Journal of Information Management, 45, 13–24. Web.

Mahdavifar, S., & Ghorbani, A. A. (2019). Neurocomputing, 347, 149–176. Web.

Print
Need an custom research paper on Analysis of Cyber Kill Chain Causes written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, August 18). Analysis of Cyber Kill Chain Causes. https://ivypanda.com/essays/analysis-of-cyber-kill-chain-causes/

Work Cited

"Analysis of Cyber Kill Chain Causes." IvyPanda, 18 Aug. 2022, ivypanda.com/essays/analysis-of-cyber-kill-chain-causes/.

References

IvyPanda. (2022) 'Analysis of Cyber Kill Chain Causes'. 18 August.

References

IvyPanda. 2022. "Analysis of Cyber Kill Chain Causes." August 18, 2022. https://ivypanda.com/essays/analysis-of-cyber-kill-chain-causes/.

1. IvyPanda. "Analysis of Cyber Kill Chain Causes." August 18, 2022. https://ivypanda.com/essays/analysis-of-cyber-kill-chain-causes/.


Bibliography


IvyPanda. "Analysis of Cyber Kill Chain Causes." August 18, 2022. https://ivypanda.com/essays/analysis-of-cyber-kill-chain-causes/.

Powered by CiteTotal, citing machine
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1