Abstract
This chapter provides a foundational understanding of cybersecurity concepts, including terminologies and attack frameworks like the cyber kill chain and MITRE ATT&CK, as well as the cybersecurity life cycle. In this chapter, key terms regarding threats, vulnerabilities, security controls, and relevant emerging technologies associated with AI are clarified, enabling effective communication within the cybersecurity field. Examining attack frameworks, which encompass the sequential stages of the cyber kill chain and the tactical matrix of MITRE ATT&CK, provides valuable insight into adversary tactics. Furthermore, the cybersecurity life cycle emphasizes a systematic approach to cybersecurity management, emphasizing risk assessment, continuous monitoring, and adaptive security measures. The purpose of this chapter is to provide readers with the knowledge and understanding necessary to navigate the complex landscape of cybersecurity with a strategic and informed perspective, providing a solid foundation for further exploration.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sarker, I.H. 2023. Multi-aspects AI-based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview. Security and Privacy 6 (5): e295. https://doi.org/10.1002/spy2.295
Sarker, I.H. 2023. Machine learning for intelligent data analysis and automation in cybersecurity: Current and future prospects. Annals of Data Science 10 (6): 1473–1498.
Craigen, D., N. Diakun-Thibault, and R. Purse. 2014. Defining cybersecurity. Technology Innovation Management Review 4 (10).
Aftergood, S. 2017. Cybersecurity: The cold war online.
Sarker, I.H. 2021. Deep cybersecurity: A comprehensive overview from neural network and deep learning perspective. SN Computer Science 2 (3): 154.
Sarker, I.H. 2021. Data science and analytics: An overview from data-driven smart computing, decision-making and applications perspective. SN Computer Science 2 (5): 377.
Dargahi, T., A. Dehghantanha, P.N. Bahrami, M. Conti, G. Bianchi, L. Benedetto. 2019. A cyber-kill-chain based taxonomy of crypto-ransomware features. Journal of Computer Virology and Hacking Techniques 15: 277–305.
Barnum, S. 2012. Standardizing cyber threat intelligence information with the structured threat information expression (STIX). Mitre Corporation 11: 1–22.
MITRE. 2023. MITRE ATT&CK. Accessed 11 Nov 2023.
NIST. 2023. NIST cybersecurity framework. Accessed 11 Oct 2023.
Xiong, W., and Lagerström, R. 2019. Threat modeling-A systematic literature review. Computers & security, 84: 53–69.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Sarker, I.H. (2024). Cybersecurity Background Knowledge: Terminologies, Attack Frameworks, and Security Life Cycle. In: AI-Driven Cybersecurity and Threat Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-031-54497-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-54497-2_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-54496-5
Online ISBN: 978-3-031-54497-2
eBook Packages: Computer ScienceComputer Science (R0)