CFP last date
20 May 2024
Reseach Article

Building and Implementation of Cyber Security Strategies under Linux Environment using Cybersecurity Kill Chain

by Vinit A. Sinha, Vilas M. Thakare
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 23
Year of Publication: 2021
Authors: Vinit A. Sinha, Vilas M. Thakare
10.5120/ijca2021921128

Vinit A. Sinha, Vilas M. Thakare . Building and Implementation of Cyber Security Strategies under Linux Environment using Cybersecurity Kill Chain. International Journal of Computer Applications. 174, 23 ( Mar 2021), 34-37. DOI=10.5120/ijca2021921128

@article{ 10.5120/ijca2021921128,
author = { Vinit A. Sinha, Vilas M. Thakare },
title = { Building and Implementation of Cyber Security Strategies under Linux Environment using Cybersecurity Kill Chain },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2021 },
volume = { 174 },
number = { 23 },
month = { Mar },
year = { 2021 },
issn = { 0975-8887 },
pages = { 34-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number23/31817-2021921128/ },
doi = { 10.5120/ijca2021921128 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:22:55.408458+05:30
%A Vinit A. Sinha
%A Vilas M. Thakare
%T Building and Implementation of Cyber Security Strategies under Linux Environment using Cybersecurity Kill Chain
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 23
%P 34-37
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A cyber strategy is view towards various aspects of security needed in cyber space. It itself describes protection required to address data , network , technical system and persons who work in this area. This article explains the basic building of cyber strategy and implementation techniques using attack and defense team . The research explain role of Linux and cybersecurity kill chain, to elaborate cyber strategies and implementation of all these techniques. The whole work is redirected towards understanding threats and risks , while building internal and external testing cyber strategies. Cybersecurity kill chain is a security model that organises both tracking and prevention of intrusion at various phases. The article ended up with implementation techniques which are sensible and more effective towards making hardening of security to cyber space.

References
  1. Steinberg, Joseph. Cybersecurity for Dummies. 1st ed. Indianapolis: John Wiley and Sons, 2019.
  2. 42 Cyber Attack Statistics by Year: A Look at the Last Decade | InfoSec Insights. (2021). Retrieved 13 January 2021, from https://sectigostore.com/blog/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade/
  3. What is The Cyber Kill Chain and How to Use it Effectively | Varonis. (2021). Retrieved 13 January 2021, from https://www.varonis.com/blog/cyber-kill-chain/
  4. Beggs, Robert W. Mastering Kali Linux for Advanced Penetration Testing a Practical Guide to Testing Your Network’s Security with Kali Linux, the Preferred Choice of Penetration Testers and Hackers. Birmingham, UK: Packt Pub., 2014. http://proquest.safaribooksonline.com/9781782163121.
  5. Rains, Tim, and an O’Reilly Media Company Safari. Cybersecurity Threats, Malware Trends, and Strategies, 2020. https://learning.oreilly.com/library/view/-/9781800206014/?ar.
  6. Sharma, Himanshu and O’Reilly for Higher Education (Firm). Kali Linux - An Ethical Hacker’s Cookbook - Second Edition, 2019. https://www.safaribooksonline.com/library/view//9781789952308/?ar.
  7. Steinberg, Joseph. Cybersecurity for Dummies. 1st ed. Indianapolis: John Wiley and Sons, 2019.
  8. Corallo, A., Lazoi, M., & Lezzi, M. (2020). Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts. Computers in Industry, 114, 103165. https://doi.org/10.1016/j.compind.2019.103165.
Index Terms

Computer Science
Information Sciences

Keywords

Cyber strategy Linux Cyber kill chain