File:Intrusion_Kill_Chain_-_v2.png
維基百科,自由的 encyclopedia
![File:Intrusion Kill Chain - v2.png](http://upload.wikimedia.org/wikipedia/commons/thumb/1/1d/Intrusion_Kill_Chain_-_v2.png/800px-Intrusion_Kill_Chain_-_v2.png)
原始檔案 (950 × 681 像素,檔案大小:158 KB,MIME 類型:image/png)
Understanding the graphic
Computer scientists at Lockheed-Martin corporation described in 2011 the usage of a new "intrusion kill chain" framework or model to defend computer networks.[1] They wrote that attacks may occur in stages and can be disrupted through controls established at each stage. The kill chain can also be used as a management tool to help continuously improve network defense. Threats must progress through seven stages in the model:
- Reconnaissance: Intruder selects target, researches it, and attempts to identify vulnerabilities in the target network.
- Weaponization: Intruder creates remote access malware weapon, such as a virus or worm, tailored to one or more vulnerabilities.
- Delivery: Intruder transmits weapon to target (e.g., via e-mail attachments, websites or USB drives)
- Exploitation: Malware weapon's program code triggers, which takes action on target network to exploit vulnerability.
- Installation: Malware weapon installs access point (e.g., "backdoor") usable by intruder.
- Command and Control: Malware enables intruder to have "hands on the keyboard" persistent access to target network.
- Actions on Objective: Intruder takes action to achieve their goals, such as data exfiltration, data destruction, or encryption for ransom.
A U.S. Senate investigation of the 2013 Target Corporation data breach included analysis based on the Lockheed-Martin kill chain framework. It identified several stages where controls did not prevent or detect progression of the attack.[2]
References
- ↑ Lockheed-Martin Corporation-Hutchins, Cloppert, and Amin-Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains-2011
- ↑ U.S. Senate-Committee on Commerce, Science, and Transportation-A "Kill Chain" Analysis of the 2013 Target Data Breach-March 26, 2014
摘要
描述Intrusion Kill Chain - v2.png |
English: Intrusion kill chain for information security |
日期 | |
來源 | http://www.public.navy.mil/spawar/Press/Documents/Publications/03.26.15_USSenate.pdf |
作者 | U.S. Senate Committee on Commerce, Science, and Transportation |
授權條款
Public domainPublic domainfalsefalse |
![]() |
![]() | |
此作品無已知的著作權限制,亦不受所有相關和鄰接的權利限制。 |
https://creativecommons.org/publicdomain/mark/1.0/PDMCreative Commons Public Domain Mark 1.0falsefalse
說明
在此檔案描寫的項目
描繪內容
26 3 2014
檔案歷史
點選日期/時間以檢視該時間的檔案版本。
日期/時間 | 縮圖 | 尺寸 | 使用者 | 備註 | |
---|---|---|---|---|---|
目前 | 2016年6月30日 (四) 17:24 | ![]() | 950 × 681(158 KB) | Farcaster | User created page with UploadWizard |
檔案用途
全域檔案使用狀況
以下其他 wiki 使用了這個檔案:
- ar.wikipedia.org 的使用狀況
- az.wikipedia.org 的使用狀況
- en.wikipedia.org 的使用狀況
- fa.wikipedia.org 的使用狀況
- fr.wikipedia.org 的使用狀況
- ja.wikipedia.org 的使用狀況
- sl.wikipedia.org 的使用狀況
- uk.wikipedia.org 的使用狀況
詮釋資料
此檔案中包含其他資訊,這些資訊可能是由數位相機或掃描器在建立或數位化過程中所新增的。若檔案自原始狀態已被修改,一些詳細資料可能無法完整反映出已修改的檔案。
水平解析度 | 47.24 dpc |
---|---|
垂直解析度 | 47.24 dpc |