lecture 1 part 2 Flashcards
steps of cyber kill chain
1) reconnaissance - target identification , identify weakness
2) Weaponization- intruder creates remote access malware weapon tailored to weakness
3) Delivery- intruder transmits weapon to target
4) Exploitation- malware weapons program code triggers
5) installation- malware weapon installs access point (backdoor) usable by intruder
6) command and control- malware enables intruder to have “hands on the keyboard” persistent access to target network
7) actions on objective - intruder takes action to achieve their goals eg data extraction
green padlock and misconceptions
system using cryptography and trusted third parties to exchange encryption keys to encrypt network traffic
misconception- makes all website use secure
issues - different certificates with different levels of authenticity