Hackers strategize their attacks by following a set of phases or stages that constitute the cyberattack life
Fantastic news! We've Found the answer you've been seeking!
Question:
Hackers strategize their attacks by following a set of phases or stages that constitute the cyberattack life cycle (i.e., cyber kill chain). In order to protect an organization's network and assets from attack, prevention must occur at each phase of the attack life cycle.
- Describe steps that should be taken at each of the eight stages of the cyber kill chain to prevent an attack. Identify potential motives that usually satisfy the mission of attackers (i.e., financial gain, brand damage, and system access).
- Explain how you would apply the cybersecurity life cycle, cybersecurity framework, and methodologies to establish a cybersecurity program that supports an organization's strategic and business initiatives.
Related Book For
Accounting Information Systems
ISBN: 978-0133428537
13th edition
Authors: Marshall B. Romney, Paul J. Steinbart
Posted Date: