- College Credit
- Beginner
About this Course
In this chapter, we cover a comprehensive analysis of cybersecurity threats by reviewing the literature on cyber-attack techniques, introducing an offensive cybersecurity framework, and proposing a systematic scoring model to quantify the complexity of both fileless and APT cyber-attacks. It explains how various attack elements—from encryption to network, web, malware, and system techniques—are mapped onto frameworks like the Cyber Kill Chain and MITRE ATT&CK, ultimately comparing the scores of different cyber-attack cases.
Types of Cybersecurity Threats
This section presents the literature review used in our proposed cyber-attack scoring model, including security for CPS, offensive cybersecurity, and state-sponsored cyber-attacks.
4 steps6.3. Offensive Cybersecurity Framework
In this stage, Types of Cybersecurity Threats, the chapter reviews the evolution and diversification of cyber threats, discusses the challenges associated with securing cyber–physical systems (CPS), and outlines the offensive cybersecurity techniques employed by different threat actors.
6 steps6.4 Cyber-Attacks Evaluation
In this stage, Cyber-Attacks Evaluation, the chapter explains how the scoring model is applied to real-world cyber-attack cases by analyzing datasets of fileless and APT attacks, mapping their techniques to the Cyber Kill Chain and MITRE ATT&CK frameworks, and then presenting comprehensive scoring results and summaries that highlight the relative complexity of each attack.
5 steps