Is cyber security magic, or just an illusion?
Written by Joe Beaumont 07/06/19
Magic, cyber security and the kill chain are all linked. For example, the first stage is reconnaissance. In cyber security terms, this is the would-be hackers choosing their target and using clever tools to probe for security holes, or even digging for dirt and useful info in public sources (aka ‘the internet’). This is not too dissimilar to the way a magician would select their ‘willing volunteer’ from the audience. They’ll see who’s susceptible to their powers of persuasion and figure out the best way to perform some of that classic misdirection.
Next up is weaponisation. Hackers select the right malware, craft a phishing email or build up a password dictionary for a good, old-fashioned brute-force attack. Likewise, a magician will decide on their trick and the best way to stage it, whilst avoiding letting anyone see their skilful slight of hand.
Then there’s payload. That’s where a hacker drops their malware or malicious link. This would be where a magician steals your watch, puts your phone in a bottle, or whatever. The point (I promise there is one), is that a decent cyber security strategy should be mapped against the kill chain in order to stop and block hacker activity at each and every stage.
ISO 27001 and 9001 certified
Tigerscheme qualified testers
PCI DSS v3.2 Level 1
24/7 on-site Security
Get a quote today
If you’re interested in our services, get a free, no obligation quote today by filling out the form below.