The Anatomy of Cyber Attacks

Cristina Pizzagalli

November 28, 2016


Cyber attacks are a constant threat. Here’s what Lockheed Martin is doing to combat them.

When it comes to security, there are two things to keep in mind. One: you never know when your data could be hacked. And two: you can never be too prepared.

Cyber attacks are increasing in sophistication every day – a reality that is directly related to the increasing amount of data potentially available in the cloud (not to mention its increasing value).

How are you defending your data territory in the cloud?

Lockheed Martin’s Computer Incident Response Team has developed something they call the Cyber Kill Chain® — a way of describing each stage in a cyber attack. It’s a useful tool to map out a potential attack, identify the threats, and be able to take preventative action as a result.

There are five progressive steps in the Cyber Kill Chain:

  1. Identify and Recon
  2. Initial Attack
  3. Command/Control
  4. Discovery/Spread
  5. Extract/Exfiltrate

Alert Logic reports that on average it takes 200 days to detect a breach, and that the majority of breaches are reported by an outside party. Sobering stuff. The good news: by anticipating each step of an attack, as the Lockheed Martin model does, it is far more likely to detect a breach before it’s too late.

Learn more about the latest developments in cloud security. Download the Cloud Security Report from Alert Logic now.

Start The Conversation

Want to learn more about how to unlock the potential of your data infrastructure? Talk to an infrastructure solutions expert today and find out how Aptum can help!

Get a Quote