Cross Organisation Attacks

Description Kill Chain Stage Cross firm attacks are launched when the attacker seeks to move laterally within a network and gain persistent access. This will…

Distributed Denial of Service

Description Kill Chain Stage A distributed denial of service (DDoS) attack is one where multiple compromised systems attack a single target, thereby causing a denial…

Privilege User Monitoring

Description Kill Chain Stage A privileged user is an employee with the kind of authority that, if abused, could cause substantial damage. Privileged users can…

Tracking System Changes

Description Kill Chain Stage Tracking system changes is essential to reducing cyber security risk. It is used to ensure that any changes made to critical…

Compromised & Infected System Tracking

Description Kill Chain Stage Tracking compromised and infected systems is important because your computer resources and bandwidth are being used to target other people. Attacks…