Cyber Defense: Deter, Detect, and Defend
This paper details the working methodology of the cyber attackers and define a sample strategy that can be used to deter, detect, and successfully defend against this kind of attack. The concept of the cyber kill chain will be discussed and mapped to the relevant stages of the broadcast chain. Any device that has an internet protocol management interface is susceptible of command and control by an unauthorized user. Following the recent hacks of U.S. radio stations in the Republican heartland that successfully aired a song against Donald Trump, the hacking of Channel 2 in Israel for politically motivated reasons, and the TV5 attack, broadcasters need to pay more attention to the cyber security of the broadcast network. Attacks come from far and wide; however, when the methodology used in attacks is analyzed, it is very similar to that used in other industries from which we can learn lessons to prevent any negative impact on our operations. Attacks come from far and wide; however, when the methodology used in attacks is analyzed, it is very similar to that used in other industries from which we can learn lessons to prevent any negative impact on our operations.
- Print ISSN
- 1545-0279
- Electronic ISSN
- 2160-2492
- Published
- 2018-07
- Content type
- Original Research
- Keywords
- Access control, cyber honeypot, cyber kill chain, cyber security, denial of service attack, network intrusion, penetration test, proactive monitoring, protective monitoring, resilience, risk management, service availability
- DOI
- 10.5594/JMI.2018.2832003