Page 42 - Сигурност и отбрана - брой 2 - 2023
P. 42
Сигурност и отбрана, брой 2, 2023 г. Научно списание
Understanding these types of cyber-attacks is important for developing
effective cyber defense strategies and mitigating the risks of cyber warfare
(Shruti, 2023).
2.4. The cyber kill chains
The cyber kill chain is a framework that outlines the stages of a cyber-
attack, from initial reconnaissance to final exfiltration of data. The cyber kill
chain was developed by Lockheed Martin and is widely used in the
cybersecurity industry to help organizations identify and prevent cyber-
attacks. The stages of the cyber kill chain are:
Reconnaissance: The attacker conducts research on the target to gather
information that can be used in the attack.
Weaponization: The attacker creates or acquires a tool or exploit that
can be used to carry out the attack.
Delivery: The attacker delivers the weaponized exploit to the target,
often using methods such as email or malicious websites.
Exploitation: The attacker uses the exploit to gain access to the target
system or network.
Installation: The attacker installs malware or other tools to maintain
access to the target system or network.
Command and control: The attacker establish a channel for remote
communication with the compromised system.
Actions on objectives: The attacker carries out their ultimate goal,
which may include stealing data, disrupting operations, or causing damage
to the system or network (Lockheed Martin, 2023).
Understanding the stages of the cyber kill chain can help organizations
identify and block attacks at an early stage, before the attacker is able to
achieve their objectives. Effective cyber defense strategies can include
measures such as threat intelligence, network segmentation, and endpoint
protection to prevent or disrupt attacks at different stages of the kill chain.
3. EFFECTS OF CYBER WARFARE
3.1. Impact of cyber warfare on governments, corporations and
individuals
The impact of cyber warfare can be significant on governments,
corporations, and individuals.
Governments:
- cyber warfare can compromise national security by stealing
sensitive information or disrupting critical infrastructure;
- it can also be used to influence or disrupt political processes, such
as elections, by manipulating public opinion or hacking into election
systems.
- cyber-attacks on government agencies can also result in financial
losses and damage to reputation (CopyCEI, 2023).
41

