The Cyber Kill Chain

Vishant GVishant G
1 min read

Cyber Attacks are not any random planning attacks , it takes place with a proper planning.This process is known as CYBER KILL CHAIN , a model created by Lockheed Martin.
The CYBER KILL CHAIN process is taken under 7 STEPS :

1. RECONNAISSANCE – information gathering
2. WEAPONIZATION- creating a malware ,etc.
3. DELIVERY- sending it through usb, pendrive, pdf etc.
4. EXPLOITATION-taking advantage of the vulnerability to execute malicious code
5. INSTALLATION-installing malware, backdoor, Trojans etc. on target system
6. COMMAND & CONTROL-hacker controlling it remotely
7. ACTION ON OBJECTIVES –hacker achieved there goal Conclusion:

The cyber kill chain shows every attack is a process, not an event. If defenders can detect and break even one step, the entire attack fails.

0
Subscribe to my newsletter

Read articles from Vishant G directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Vishant G
Vishant G