It is a cybersecurity framework that offers a method to deal with the intrusions on a computer network.
Overview
The attacker performs reconnaissance, intrusion of the security perimeter, exploitation of vulnerabilities, gaining and escalating privileges, lateral movement to gain access to more valuable targets, attempts to obfuscate their activity, and finally exfiltrate data from the organization.
➖ Reconnaissance
Intruder picks a target, researches it, and looks for vulnerabilities
Reconnaissance
Detect: Web Analytics; Threat Intelligence; Network Intrusion Detection System
Deny: Information Sharing Policy; Firewall Access Control Lists
➖Weaponization
Intruder develops malware designed to exploit the vulnerability
Weaponization
Detect: Threat Intelligence; Network Intrusion Detection System
Deny: Network Intrusion Prevention System
➖Delivery
Intruder transmits the malware via a phishing email or another medium