NZCyberResearchCenter

Cyber Kill-Chain

Cyber kill-chain: Lockheed Martin’s kill chain is part of the intelligence-driven defence model for identifying and preventing cyber intrusion activity; Cyber kill chain methods help us understand adversary’s tactics, tools and technics, and procedures. The model identifies the steps that adversaries need to accomplish to achieve their goal Lockheed martin’s kill chain model was designed […]

Cyber Kill-Chain Read More »

Security Awareness Program

Security Awareness Program Awareness programs:  Employee awareness programs are designed to protect organisation assets from security threats that affect the Confidentiality, Integrity, and Availability (CIA) of the assets. Training employees will reduce the attack surface, so system users know how to react to security-related issues such as spam emails with malicious files or links, time of

Security Awareness Program Read More »

Risk Assessment

Risk Assessment Information is collected, stored, and transmitted in private and public sectors for business purposes. That information is vulnerable to bad actors, environmental disasters, human errors, and so on. and needs protection at all states of the data lifecycle. This is where risk assessment plays a major role. Risk assessment helps to identify specific

Risk Assessment Read More »