Cyber 101

Develop a view on Cyber

Learn with us as our 8 Part Cyber Edu-series brings you a snippet about the facets of Cyber every last Monday of the month. Issues will cover the latest topics and get you acquainted with cyber in an instant

How can you triumph over cyber challenges today? Cyber attackers are just getting started and no businesses are immune. Keep a lookout on this page for the latest part every month.

Subscribe in the form on your right to receive an exclusive e-book combining all 8 parts of the  series and a bonus infographic at the end of this series in December. 

Cyber 101 Subscription Form 

Subscribe here

Your biggest risk could be you

July 2017 Part 3

Anatomy of a Cyber Attack

One of the most important knowledge that a cyber security professional would have to know is the Cyber Kill Chain. The Cyber Kill Chain is a seven-stage model that illustrates how cyber criminals get to their victims and target on the system’s vulnerabilities.

7-Stages of Cyber Kill Chain

  1. Reconnaissance
  • Attacker gathers information on the target before launching attack. They usually look for publicly available information on the Internet.

2. Weaponization

  • The attacker uses an exploit and create a malicious payload to send the victim without actual contact with them.

3.  Delivery

  • Attacker sends malicious payload to the victim by email or through other means, which is only one of the numerous intrusion methods the attacker can use.

4.  Exploitation

  • The actual exploitation only takes place when the attacker uses an exploit.

5.  Installation

  • Installing malware on the infected computer is only relevant if the attacker used malware as part of the attack.

6.  Command and Control

  • The attacker creates a command and control channel to continue operating his internal assets remotely.

7.  Actions

  • Attacker performs these steps to achieve his actual goals inside the victim’s network.


Key takeaways

Knowing and understanding the “7 Steps of The Cyber Kill Chain” enable organisations to trace the movements of an attacker and take the necessary security precautions to prevent such attack from happening.

However, over-focus on this area can also be detrimental to network security. A persistent, highly determined and skilled attacker will always find a way into the network. Thus, instead of analysing old malware, organisation should also focus on detecting ongoing attacks before the damage is done.

July 2017 Part 3: 7 Stages of Cyber Kill Chain
References Responding to cyber threats in the new reality.
Retrieved from

Alien Vault. Defend like an attacker: Applying the cyber kill chain
Retrieved from Alien Vault:

Telelink. Access Networking Threats, Corporate WAN Threats, IT Threats
Retrieved from Telelink:

Techopedia. Active Reconnaissance.
Retrieved from Techopedia:

The Guardian. (2016, October 22). Cyber attack: hackers ‘weaponised’ everyday devices
with malware. Retrieved from The Guardian:

University of Pennsylvania. Cyber Weapons. Retrieved from University of Pennsylvania:

Alert Logic. (2016, December 30). The Cyber Kill Chain: Understanding Advanced Persistent Threats. Retrieved from Alert Logic:

Dark Reading. (2016, September 9). A Twist On The Cyber Kill Chain: Defending Against A Javascript Malware Attack. Retrieved from Dark Reading:

CNN. (2017, June 28). Another big malware attach ripples across the world. Retrieved from CNN:

Bleeping Computer (2017, July 20). Valve Patches Security Flaw That Allows Installation of Malware via Steam Games. Retrieved from Bleeping Computer:

RSA. (2012, August 16). Stalking The Kill Chain: The Attacker’s Chain. Retrieved from RSA:

News. (2017, May 15). Ransomware cyberattack hits Australia as EU warns victims worldwide may grow. Retrieved from News:

Infosec Institute. (2013, May 21). Cyber Kill Chain is a Great Idea, But Is It Something Your Company Can Implement. Retrieved from Infosec Institute:

June 2017 Part 2

What are your risks?

Cyber Theft

  • Online payment systems may not guarantee the safety of your money – $81M stolen from central bank of Bangladesh in 2016 cyber heist
  • Drugs, information and your credit card data – Take your pick in the online black markets

Identity Theft

  • Is your child’s identity at risk? – Young mum experiences ‘digital kidnapping’

Cyber Bullying

  • Cyber bullying can kill - How it can lead to suicide


  • Your data and devices could be held hostage – Find out the anatomy of a ransomware

How is your data retrieved?

Social Engineering Attacks

  • Baiting – Watch what happens when you plug a foreign device into your computer
  • Phishing – Personal details targeted in phishing emails that appears as Google Docs
  • Pretexting – Your board director can be an impersonator to get your phone records (Hewlett-Packard incident)
  • Read more on social engineering fraud


  • Social media alone can help cyber criminals know you better– 30% of internet users vulnerable to attacks
  • Google tracks you by what you share – Here’s how to stop it
  • Think before you post – When it can cost you your job

What can you do?

  • Be discreet about your privacy settings and ‘check-in’s.
  • Be sure you know who people are before accepting connections
  • Be wary about messages from unfamiliar emails
June 2017 Part 2: Your Biggest Risk Could Be You

Daily Mail. (2016, April 23). Hackers steal $81 million from a Bangladeshi bank with no firewall... and were only caught out when the illiterate fraudsters spelt 'foundation' as 'fandation'. Retrieved from Daily Mail:

News. (2016, January 18). Suspicion and mistrust: Total anarchy on the dark web. Retrieved from News:

Yahoo. (2015, March 3). The Disturbing Facebook Trend of Stolen Kids Photos. Retrieved from Yahoo:

CNN. (2016, December 1). Teen who was relentlessly bullied kills herself in front of her family. Retrieved from CNN: Ransomware is moving to the next level. Retrieved from Cyber video: Companies like yours. Retrieved from:

NBC News. (2017, May 4). Massive Phishing Attack Targets Gmail Users. Retrieved from NBC News:

The New York Times. (2006, September 8). Hewlett-Packard Spied on Writers in Leaks. Retrieved from The New York Times: Safeguarding your enterprise from social engineering fraud risks. Retrieved from (2016, January 10). Oversharing on social networking sites leaves 30% internet users vulnerable to cybercrime. Retrieved from

Wired. (2017, March 20). Google tracks everything you do: here’s how to delete it. Retrieved from Wired: Phishing and ransomware can be your worst nightmares, how can you prevent these evolving threats. Retrieved from

May 2017 Part I

Hunting in the Cyberspace

You may have read the recent news about one of the largest cyber attacks, the WannaCry Ransomware. This incident is a wake-up call to all organisations alike, requiring global responsibility and attention to prevent future episodes. We hope to shed light on the fundamentals of cyber security with this 8 part Edu-series to help you understand and protect your data.

Cyber attacks, unlike physical warfare, transcend national borders by compromising computer systems and networks. In this interconnected digital sphere, they threaten the very infrastructures that nations and corporations depend on. Data theft, manipulation of networks and disabling online platforms have amounted to considerable repercussions.

Undeniably, major cyber infringements demonstrate the vulnerability of all organizations’ systems. The growing trend of political cyber attacks has formed a new field of spying: cyber espionage – superpowers have engaged cyber software such as Stuxnet, Flame and DuQu, in an attempt to monitor, collect and control its target. Subscribe for more information!

May 2017 Part I: Hunting in the Cyberspace

BBC. (2010, August 25). Secret US military computers 'cyber attacked' in 2008. Retrieved from BBC:

BBC. (2013, January 31). New York Times 'hit by hackers from China'. Retrieved from BBC:

Broad, W. J., Markoff, J., & Sanger, D. E. (2011, January 15). Israeli Test on Worm Called Crucial in Iran Nuclear Delay. Retrieved from The New York Times:

CNET. (2017, May 15). WannaCry ransomware: Everything you need to know. Retrieved from CNET:

Fiegerman, S. (2016, December 15). Yahoo says data stolen from 1 billion accounts. Retrieved from CNN:

Jones, S. (2014, August 29). Ukraine: Russia’s new art of war. Retrieved from Financial Times:

Lee, T. B. (2013, November 1). How a grad student trying to build the first botnet brought the Internet to its knees. Retrieved from Washington Post:

Russell, A. (2004, February 28). CIA plot led to huge blast in Siberian gas pipeline. Retrieved from Telegraph:

Telegraph. (2013, January 14). Red October computer virus found. Retrieved from Telegraph:

Did you find this useful?