Malware or Botnet Infection

Description Kill Chain Stage Malware – short for malicious software – is any software that is used to automate malicious activity, whether through disrupting computer…

Monitoring User Privileges

Description Kill Chain Stage Monitoring user privileges provides oversight over users and provides the member firm with the ability to detect when activities connected to…

Detecting Recon Attempts

Description Kill Chain Stage Network reconnaissance scans and probes networks and precede a network attack. An attacker who successfully conducts reconnaissance on a network has…

Remote Connectivity and VPN

Description Kill Chain Stage VPN provides an attractive target for potential attackers for two reasons: first, VPN transmits sensitive information over public and shared networks…

Tracking User Authentication

Description Kill Chain Stage User authentication tracking mitigates the threat of an individual user losing control of their credentials, such as through theft and/or appropriation…