Skip to main content

Question of the day 03/09, Cybersecurity Edition


marcofabbri
Forum|alt.badge.img+13

Day 3.

What's the ultimate goal of the cyber kill chain?

- Install new device to protect the network 

- Produce documentation of a possible vuln

- Identify and mitigate vulns before attack

- 5 stages of an malicious attack

 

 

 

4 comments

JMeixner
Forum|alt.badge.img+17
  • On the path to Greatness
  • 2650 comments
  • September 3, 2022

Produce documentation/reports of/about a possible vuln or cyber attack.

It is part of a framework to identify and mitigate attacks.


dips
Forum|alt.badge.img+7
  • Veeam Legend
  • 808 comments
  • September 3, 2022

 Identify and mitigate vulns before attack
 

As @JMeixner mentioned, it’s part of a framework to identify and mitigate attacks


Chris.Childerhose
Forum|alt.badge.img+21
  • Veeam Legend, Veeam Vanguard
  • 8512 comments
  • September 3, 2022

Identify and mitigate vulns before attack


marcofabbri
Forum|alt.badge.img+13
  • Author
  • On the path to Greatness
  • 990 comments
  • September 4, 2022

"Produce documentation of a possible vuln" is absolutely a part of the kill chain, but the ultimate goal is to "Identify and mitigate vulns before attack".

:)


Comment