Attackers can teach you to defend your organization against phishing

Getting in the mind of a criminal preparing to craft a phishing attack is easier when you consider the classic Cyber Kill Chain developed by Lockheed Martin, which we’ve adapted to the following eight steps: External reconnaissance Delivery Code execution Persistence Command and control Internal reconnaissance Lateral movement Objective Using the kill chain to assess how an attacker would approach your organization makes it easier to understand which steps, at a minimum, would need to be taken by an arbitrary attacker to succeed in a phishing attack against your company.

Read full article on Help Net Security

 


Date:

Categorie(s):