All language subtitles for 2. Cyber Kill Chain Questions

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew Download
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,900 --> 00:00:07,530 Cyber chain is one of the most important question which is asked in the interview. 2 00:00:08,160 --> 00:00:09,920 So let me discuss about that. 3 00:00:09,930 --> 00:00:13,260 What is the difference between Cyber Keychain and Miter TEC? 4 00:00:13,260 --> 00:00:19,110 But before that, let's see what actually the cyber kill chain and what are the phrases we have. 5 00:00:19,590 --> 00:00:24,270 So in cyber kill chain, we have about seven phases. 6 00:00:24,270 --> 00:00:25,050 Exactly. 7 00:00:25,770 --> 00:00:30,900 The number one, we have requirements, weaponization delivery, exploration, installation, command 8 00:00:30,900 --> 00:00:33,900 and control, and then action and objectives. 9 00:00:34,440 --> 00:00:36,210 And so these are the seven stages. 10 00:00:36,210 --> 00:00:38,670 So here are seven tactics, you can say. 11 00:00:38,820 --> 00:00:41,700 And in my attack, there was 14. 12 00:00:43,660 --> 00:00:44,110 Now. 13 00:00:44,650 --> 00:00:45,310 Okay. 14 00:00:45,400 --> 00:00:51,370 One question generally has by always by the interviewer that can you please elaborate your word incident 15 00:00:51,370 --> 00:00:53,440 case in the form of cyber keychain. 16 00:00:53,650 --> 00:01:01,750 So basically what what actually the interview is are asking to you that if you have done any any type 17 00:01:01,750 --> 00:01:10,780 of you know, investigation on malware or you have done any incident in your previous organization, 18 00:01:10,780 --> 00:01:19,780 then are you able to explore or are you able to tell those investigations in the form of cyber kill 19 00:01:19,780 --> 00:01:20,980 chain process? 20 00:01:21,430 --> 00:01:24,600 Let's say if let me take give you an example. 21 00:01:24,610 --> 00:01:29,170 Let's say I worked on Emotet malware, right? 22 00:01:29,170 --> 00:01:33,160 So what I will do is I recommends what attacker will do with Emotet. 23 00:01:33,160 --> 00:01:38,230 So as a recurrence, definitely we need one of the email ID of the user. 24 00:01:38,440 --> 00:01:38,920 Right. 25 00:01:39,040 --> 00:01:40,390 So of the organization. 26 00:01:40,390 --> 00:01:47,440 So that is what recommends weaponization is I am creating the mail delivery that I'm sending the mail 27 00:01:47,440 --> 00:01:49,420 to that user exploitation. 28 00:01:49,420 --> 00:01:52,600 The user is clicking on that attachment installation. 29 00:01:52,600 --> 00:01:58,930 Once it will click on that, it is going to install and it will after that it will communicate for the 30 00:01:58,930 --> 00:02:03,370 command and control and then action objectives means whatever I want. 31 00:02:03,370 --> 00:02:06,490 Why, if I want to steal the data, I can do so. 32 00:02:06,490 --> 00:02:07,930 This is how actually it works. 33 00:02:07,930 --> 00:02:09,940 So these two questions are very important. 34 00:02:09,940 --> 00:02:14,710 Apart from that, the difference between cyber kill chain and my attack. 35 00:02:15,310 --> 00:02:18,490 So now see here both both are similar. 36 00:02:18,490 --> 00:02:22,750 What what their aim is they have to get in, right. 37 00:02:22,750 --> 00:02:26,830 And they don't want to court and they want to get out. 38 00:02:28,270 --> 00:02:30,430 Definitely they want to steal the data. 39 00:02:30,460 --> 00:02:33,340 These three things, they have the similarity. 40 00:02:33,730 --> 00:02:41,710 But the difference is that cyber kill chain is the step by step process, whereas minor attack is not. 41 00:02:42,160 --> 00:02:47,910 If there is some initial access is happening after person, let's say privilege escalation after privilege 42 00:02:48,130 --> 00:02:48,730 escalation. 43 00:02:48,730 --> 00:02:52,090 It is not mandated that they will go for the persistence. 44 00:02:52,090 --> 00:02:54,550 They can go for the little moment. 45 00:02:54,550 --> 00:02:58,750 So the techniques, I mean that is not a sequence wise. 46 00:02:58,750 --> 00:03:02,440 And whereas a cyber kill is sequence sequence wise. 47 00:03:02,440 --> 00:03:07,630 So this is what the basic difference between cyber kill chain and miter attack. 4365

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.