LEVERAGING USERS TO BREAK CYBER KILL CHAIN
| dc.contributor.author | Kokofi, Charles | |
| dc.contributor.department | fi=Tulevaisuuden teknologioiden laitos|en=Department of Future Technologies| | |
| dc.contributor.faculty | fi=Luonnontieteiden ja tekniikan tiedekunta|en=Faculty of Science and Engineering| | |
| dc.contributor.studysubject | fi=Tietotekniikka|en=Information and Communication Technology| | |
| dc.date.accessioned | 2020-01-21T10:49:00Z | |
| dc.date.available | 2020-01-21T10:49:00Z | |
| dc.date.issued | 2019-12-20 | |
| dc.description.abstract | Cyber kill chain defined the chronological strategies that attackers follow in invading information system with the hope of reducing the exponential increase in attacks by equipping organizations and technological stakeholders to revise and build a resilient defensive strategy capable of identifying and preventing attack. Considering how well resourced these attackers, using complicated tools and techniques such as customised attacker vectors and weapons capable of subverting any system or network calls for a counter-productive strategy such as attack surface reduction. Breaking the cyber kill chain using attack surface reduction involve limiting the success of an attacker at every stage of the cyber kill chain. Attack surface reduction involves controlling user behaviours, use of efficient and robust technologies and implementation of a resilient attack defence model. Leveraging the cyber kill chain would be released through evaluation and analysis of technologies, defense models to determine the efficiency and robustness, review of related literatures and implementation strategies capable of subverting the success of an attacker. | |
| dc.format.extent | 71 | |
| dc.identifier.olddbid | 165686 | |
| dc.identifier.oldhandle | 10024/148827 | |
| dc.identifier.uri | https://www.utupub.fi/handle/11111/11029 | |
| dc.identifier.urn | URN:NBN:fi-fe202001202710 | |
| dc.language.iso | eng | |
| dc.rights | fi=Julkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty.|en=This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.| | |
| dc.rights.accessrights | avoin | |
| dc.source.identifier | https://www.utupub.fi/handle/10024/148827 | |
| dc.subject | Hacking, cyber kill chain, attack vectors, defense model, perimeter defense, defense in depth, defense in breadth, attack surface reduction | |
| dc.title | LEVERAGING USERS TO BREAK CYBER KILL CHAIN | |
| dc.type.ontasot | fi=Diplomityö|en=Master's thesis| |
Tiedostot
1 - 1 / 1