Skip to main content

Cybersecurity Background Knowledge: Terminologies, Attack Frameworks, and Security Life Cycle

  • Chapter
  • First Online:
AI-Driven Cybersecurity and Threat Intelligence

Abstract

This chapter provides a foundational understanding of cybersecurity concepts, including terminologies and attack frameworks like the cyber kill chain and MITRE ATT&CK, as well as the cybersecurity life cycle. In this chapter, key terms regarding threats, vulnerabilities, security controls, and relevant emerging technologies associated with AI are clarified, enabling effective communication within the cybersecurity field. Examining attack frameworks, which encompass the sequential stages of the cyber kill chain and the tactical matrix of MITRE ATT&CK, provides valuable insight into adversary tactics. Furthermore, the cybersecurity life cycle emphasizes a systematic approach to cybersecurity management, emphasizing risk assessment, continuous monitoring, and adaptive security measures. The purpose of this chapter is to provide readers with the knowledge and understanding necessary to navigate the complex landscape of cybersecurity with a strategic and informed perspective, providing a solid foundation for further exploration.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sarker, I.H. 2023. Multi-aspects AI-based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview. Security and Privacy 6 (5): e295. https://doi.org/10.1002/spy2.295

    Article  Google Scholar 

  2. Sarker, I.H. 2023. Machine learning for intelligent data analysis and automation in cybersecurity: Current and future prospects. Annals of Data Science 10 (6): 1473–1498.

    Article  Google Scholar 

  3. Craigen, D., N. Diakun-Thibault, and R. Purse. 2014. Defining cybersecurity. Technology Innovation Management Review 4 (10).

    Google Scholar 

  4. Aftergood, S. 2017. Cybersecurity: The cold war online.

    Google Scholar 

  5. Sarker, I.H. 2021. Deep cybersecurity: A comprehensive overview from neural network and deep learning perspective. SN Computer Science 2 (3): 154.

    Article  Google Scholar 

  6. Sarker, I.H. 2021. Data science and analytics: An overview from data-driven smart computing, decision-making and applications perspective. SN Computer Science 2 (5): 377.

    Article  Google Scholar 

  7. Dargahi, T., A. Dehghantanha, P.N. Bahrami, M. Conti, G. Bianchi, L. Benedetto. 2019. A cyber-kill-chain based taxonomy of crypto-ransomware features. Journal of Computer Virology and Hacking Techniques 15: 277–305.

    Article  Google Scholar 

  8. Barnum, S. 2012. Standardizing cyber threat intelligence information with the structured threat information expression (STIX). Mitre Corporation 11: 1–22.

    Google Scholar 

  9. MITRE. 2023. MITRE ATT&CK. Accessed 11 Nov 2023.

    Google Scholar 

  10. NIST. 2023. NIST cybersecurity framework. Accessed 11 Oct 2023.

    Google Scholar 

  11. Xiong, W., and Lagerström, R. 2019. Threat modeling-A systematic literature review. Computers & security, 84: 53–69.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sarker, I.H. (2024). Cybersecurity Background Knowledge: Terminologies, Attack Frameworks, and Security Life Cycle. In: AI-Driven Cybersecurity and Threat Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-031-54497-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-54497-2_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-54496-5

  • Online ISBN: 978-3-031-54497-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics