Cyber-kill Chain

A Qualitative Exploration of Adversarial Adaptability, Group Dynamics, and Cyber-Intrusion Chains

Abstract:

Conventional cyber attack management is reactive, which is ineffective in curbing sophisticated adversaries, especially Advanced Persistent Threats (APTs). There is an immediate need for proactive cyber-security measures that reflect the adaptive and dynamic nature of these adversaries. Using empirical evidence of observations and interviews conducted at the Industrial Control Systems Computer Emergency Response Team’s (ICS-CERTs) Red-Team/Blue-Team cyber-security training exercise held at Idaho National Laboratory (INL), this paper highlights the human aspects of cyber attacks, with a specific focus on adversarial intrusion chains, adaptability after attack disruptions, and group dynamics.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com