Page 42 - Сигурност и отбрана - брой 2 - 2023
P. 42

Сигурност и отбрана, брой 2, 2023 г.                             Научно списание



                        Understanding these types of cyber-attacks is important for developing
                  effective cyber defense strategies and mitigating the risks of cyber warfare
                  (Shruti, 2023).
                        2.4. The cyber kill chains
                        The cyber kill chain is a framework that outlines the stages of a cyber-
                  attack, from initial reconnaissance to final exfiltration of data. The cyber kill
                  chain  was  developed  by  Lockheed  Martin  and  is  widely  used  in  the
                  cybersecurity  industry  to  help  organizations  identify  and  prevent  cyber-
                  attacks. The stages of the cyber kill chain are:
                        Reconnaissance: The attacker conducts research on the target to gather
                  information that can be used in the attack.
                        Weaponization: The attacker creates or acquires a tool or exploit that
                  can be used to carry out the attack.
                        Delivery: The attacker delivers the weaponized exploit to the target,
                  often using methods such as email or malicious websites.
                        Exploitation: The attacker uses the exploit to gain access to the target
                  system or network.
                        Installation: The attacker installs malware or other tools to maintain
                  access to the target system or network.
                        Command and control: The attacker establish a channel for remote
                  communication with the compromised system.
                        Actions  on  objectives:  The  attacker  carries  out  their  ultimate  goal,
                  which may include stealing data, disrupting operations, or causing damage
                  to the system or network (Lockheed Martin, 2023).
                        Understanding the stages of the cyber kill chain can help organizations
                  identify and block attacks at an early stage, before the attacker is able to
                  achieve  their  objectives.  Effective  cyber  defense  strategies  can  include
                  measures such as threat intelligence, network segmentation, and endpoint
                  protection to prevent or disrupt attacks at different stages of the kill chain.

                        3. EFFECTS OF CYBER WARFARE
                        3.1.  Impact  of  cyber  warfare  on  governments,  corporations  and
                  individuals
                        The  impact  of  cyber  warfare  can  be  significant  on  governments,
                  corporations, and individuals.
                        Governments:
                        -  cyber  warfare  can  compromise  national  security  by  stealing

                  sensitive information or disrupting critical infrastructure;
                        -  it can also be used to influence or disrupt political processes, such
                  as  elections,  by  manipulating  public  opinion  or  hacking  into  election
                  systems.
                        -  cyber-attacks on government agencies can also result in financial
                  losses and damage to reputation (CopyCEI, 2023).

                                                                                                    41
   37   38   39   40   41   42   43   44   45   46   47