Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.
Well done!
You have completed (UPI) Chapter 1: Basic Concepts and Models of Cybersecurity!
Instruction
1.3.3 Stages of an Intrusion
The Cyber Kill Chain is a popular framework proposed by Lockheed Martin (Hutchins et al. 2011) that outlines the typical stages of a cyberattack:
-
Reconnaissance: Research and identify targets.
-
Weaponisation: Combine a remote access Trojan with an exploit to create a deliverable payload.
- Delivery: Transmit the weapon to the target (e.g., via email attachments o...