Process of Information System Attack

Abstract

Adequate protection level of the information systems are essential for the suitable operations in the social, economic and defense sectors. The growing number of successful attacks illustrate that the currently used security solutions have only limited capabilities. The author of the article demonstrates the process of the evergrowing number of advanced attacks and the protection solutions for each individual process steps which are used in recognizing and preventing the chain of the attack. Furthermore, todays widely used protection solutions are introduced and the reason for their limited capabilities in preventing advanced attacks are examined.

Keywords:

process of cyber attack Intrusion Kill Chain APT cyber defense cyber attacker