The Cyber Kill Chain – Evaluating and Denying Threats

Part 2 of the module on the CKC examines the steps concerned with analyzing threats and the various defensive actions available to thwart them. Threat analysis can consist of looking at the delivery mechanism, examining log files from various sources along with looking for obvious signs of malicious intent such as emails with harmful links and attachments or infected software. Knowing what assets and individuals are being targeted can provide valuable clues. This type of intel can be extracted from log files, IDPS, firewalls and proxies as well as from phishing and social engineering attacks. Intent can also be inferred from the targeting of databases, websites, Active Directory servers, and evidence of network mapping. The synchronization of events from various sources is critical for proper forensic reconstruction. This entails the use of NTP (Network Time Protocol). It entails extra work, but is required to prevent possible incorrect conclusions. Delaying and degrading adversary tactics and malware are key steps in the CKC. Processes and methods for these steps consist of security awareness training, secure coding practices, vulnerability scanning and pentesting, endpoint hardening of servers and mobile devices to reduce attack surfaces, along with endpoint process auditing.
Recommended Study Material

Recorded Future Cyber Daily



With new threats lurking around every corner, you need to be prepared. Join thousands of your infosec peers and subscribe to the Cyber Daily for free trending threat intelligence insights.



Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google Play Get it on the App Store

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?