The Cyber Kill Chain is a framework developed by Lockheed Martin to describe the stages of a cyber attack, understanding it helps organizations identify and prevent cyber attacks by breaking down the attack into manageable phases.
Reconnaissance
In the reconnaissance phase the objective is gathering information...
This is a network security measure used to handle unwanted or potential harmful traffic. If the traffic is unwanted or harmful, all the data sent to a particular IP address or network is intentionally discarded or ignored, without informing the source of the traffic....
Web Application Firewall (WAF)
It’s a Firewall that operates at the Application Layer (Layer 7 OSI) that’s designed to monitor, filter and block HTTP/HTTPS traffic to and from a Web Application.
This type of firewall can be deployed in two different methods:
Proxy Mode: It directly receives...