Process of Information System Attack
Abstract
Adequate protection level of the information systems are essential for the suitable operations in the social, economic and defense sectors. The growing number of successful attacks illustrate that the currently used security solutions have only limited capabilities. The author of the article demonstrates the process of the evergrowing number of advanced attacks and the protection solutions for each individual process steps which are used in recognizing and preventing the chain of the attack. Furthermore, todays widely used protection solutions are introduced and the reason for their limited capabilities in preventing advanced attacks are examined.
Keywords:
process of cyber attack
Intrusion Kill Chain
APT
cyber defense
cyber attacker