Good read for understanding Malware and how it works….

I happened to meet a friend of mine Wyman Stocks (wymanstocks.com) and he was relating his experience of Malware and how malware attacks can be understood and analyzed. Once we understand how malware attacks are performed, we can mitigate or avoid these attacks. The following diagram is a good start. Scroll down below for more information.

Cyber Kill Chain

Cyber Kill Chain

Here are some interesting reads:

a. http://papers.rohanamin.com/wp-content/uploads/papers.rohanamin.com/2011/08/iciw2011.pdf

b. http://www.digitalbond.com/2011/11/22/applying-the-cyber-kill-chain-to-ics-part-1/

c. http://www.digitalbond.com/2011/11/29/applying-the-cyber-kill-chain-to-ics-part-2/

d. http://www.cs.cmu.edu/~scenariograph/sheynerthesis.pdf

Companies like Lockheed Martin are standing behind these initiatives - do  you know such concepts that you are intrigued? Please let us know.

Leave a Reply

You must be logged in to post a comment.