Analysis of the Cyber Kill Chain Model Focused on Computer Security Through Virtualized Controlled Processes

Edison Alexander Velasco Cabrera*, Javier Guaña-Moya

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The term Cyber Kill Chain refers to the seven stages that a computer criminal must go through to achieve an effective attack, that is, it is a model that determines what cybercriminals must complete to achieve the objective. Therefore, the opportunity to stop them at any of these stages means breaking the attack chain. Its importance arises from the fact that currently the growth in the scale and complexity of cyberattacks directed at the data of organizations and people has registered an accelerated increase, with very elaborate patterns that have begun to be called Advanced Persistent Threat (APT). According to an analysis corresponding to 2023, the global average cost of data breach was $4.45 million, representing an increase of 15% in 3 years. Therefore, understanding each of these phases is essential to develop computer security programs, because defense teams will be able to anticipate the activities of attackers, taking effective measures to prevent, discover or minimize attacks in each phase. Consequently, applying knowledge of the various stages of a cyberattack allows the infrastructure to be prepared to counteract data breaches in the widest possible range of tools, means and controlled processes applied by users, both at a personal and business level.

Original languageEnglish
Title of host publicationPerspectives and Trends in Education and Technology - Selected Papers from ICITED24
EditorsJoão Vidal Carvalho, António Abreu, Eusébio Ferreira da Costa, Enrique Vázquez-Justo, Hernán Viguera Figueroa
PublisherSpringer Science and Business Media Deutschland GmbH
Pages506-516
Number of pages11
ISBN (Print)9783031747502
DOIs
StatePublished - 30 Nov 2024
EventInternational Conference in Information Technology and Education, ICITED 2024 - Recife, Brazil
Duration: 11 Jul 202413 Jul 2024

Publication series

NameLecture Notes in Networks and Systems
Volume858 LNNS
ISSN (Print)2367-3370
ISSN (Electronic)2367-3389

Conference

ConferenceInternational Conference in Information Technology and Education, ICITED 2024
Country/TerritoryBrazil
CityRecife
Period11/07/2413/07/24

Bibliographical note

Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.

Keywords

  • advanced persistent threats
  • computer attacks
  • controlled processes
  • Cyber Kill Chain
  • cybersecurity

Cite this