Cyber Kill Chains
The Cyber Kill Chain is a methodology used by cybersecurity researchers and professionals to identify, track, and ultimately prevent or stop cyberattacks.
The Cyber Kill Chain model was created by Lockheed Martin in 2011 and has been widely adopted as a standard methodology for understanding and preventing cyberattacks.
The Cyber Kill Chain model consists of seven stages:
1. Reconnaissance: The attacker identifies potential targets and gathers information about them.
2. Weaponization: The attacker creates a malicious payload or exploit specifically designed to attack the target.
3. Delivery: The attacker delivers the payload or exploit to the target.
4. Exploitation: The payload or exploit is executed on the target, resulting in a compromise.
5. Installation: The attacker installs malware or a backdoor on the target system.
6. Command and Control: The attacker gains remote access to the target system and issues commands to it.
7. Actions on Objectives: The attacker accomplishes their objectives, whether that be data exfiltration, system destruction, or something else.
Secure Your Cyber Security: A Guide to CIA (Confidentiality, Integrity, & Availability)