Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.

Well done!

You have completed (UPI) Chapter 1: Basic Concepts and Models of Cybersecurity!

Instruction

1.3.3 Stages of an Intrusion

The Cyber Kill Chain is a popular framework proposed by Lockheed Martin (Hutchins et al. 2011) that outlines the typical stages of a cyberattack:

  1. Reconnaissance: Research and identify targets.
  2. Weaponisation: Combine a remote access Trojan with an exploit to create a deliverable payload.
  3. Delivery: Transmit the weapon to the target (e.g., via email attachments o...