The Cyber Kill Chain

Cyber Attacks are not any random planning attacks , it takes place with a proper planning.This process is known as CYBER KILL CHAIN , a model created by Lockheed Martin.
The CYBER KILL CHAIN process is taken under 7 STEPS :
1. RECONNAISSANCE – information gathering
2. WEAPONIZATION- creating a malware ,etc.
3. DELIVERY- sending it through usb, pendrive, pdf etc.
4. EXPLOITATION-taking advantage of the vulnerability to execute malicious code
5. INSTALLATION-installing malware, backdoor, Trojans etc. on target system
6. COMMAND & CONTROL-hacker controlling it remotely
7. ACTION ON OBJECTIVES –hacker achieved there goal Conclusion:
The cyber kill chain shows every attack is a process, not an event. If defenders can detect and break even one step, the entire attack fails.
Subscribe to my newsletter
Read articles from Vishant G directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
