Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains

Overview:

This white paper discusses the use of "kill chains" in the analysis of these threats and the use of the resulting data for system protection.

There's More to This Story

Get more. You can read the rest of this story and other exclusive content as a Plant Services member. It's FREE, and it’s easy. We just need your name and email address. Then you can read everything you want on our site and even comment on it.

View all white papers»

What are your comments?

Join the discussion today. Login Here.

Comments

No one has commented on this page yet.

RSS feed for comments on this page | RSS feed for all comments