Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Implementing Intrusion Kill Chain Strategies
by
Howard, Rick
, Olson, Ryan
in
PROFESSIONAL COMMENTARY
2020
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Implementing Intrusion Kill Chain Strategies
by
Howard, Rick
, Olson, Ryan
in
PROFESSIONAL COMMENTARY
2020
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Journal Article
Implementing Intrusion Kill Chain Strategies
2020
Request Book From Autostore
and Choose the Collection Method
Overview
This paper extends the work of the Lockheed Martin research team on intrusion kill chains (the identification and prevention of cyber intrusions) in 2010. The theory has languished in the network defender community not because it is not the right idea, but because most InfoSec teams do not have the resources to implement it. What has prevented the success of the intrusion kill chain strategy is a standard framework to collect the intelligence associated with specific adversaries, to share and consume that standardized intelligence with trusted partners, and then to automatically process that intelligence and distribute new prevention controls to the network defender’s security stack. The adversary playbook is that framework.
Publisher
Army Cyber Institute
Subject
This website uses cookies to ensure you get the best experience on our website.