From CISO Marketplace — the hub for security professionals Visit

Cyber Kill Chain

Data Protection

Definition

A framework for understanding the stages of cyber attacks to better defend against them.

Technical Details

The Cyber Kill Chain is a model developed by Lockheed Martin that outlines the stages of a cyber attack, providing a systematic way to analyze and respond to threats. It consists of seven phases: 1) Reconnaissance - attackers gather information about the target; 2) Weaponization - attackers create a deliverable payload; 3) Delivery - the payload is transmitted to the target; 4) Exploitation - the payload is executed; 5) Installation - the attacker installs malware on the target's system; 6) Command and Control (C2) - the attacker establishes a communication channel with the compromised system; 7) Actions on Objectives - the attacker performs the intended actions, such as data exfiltration or destruction. Understanding these stages helps organizations to implement preventive measures and detect intrusions early in the attack lifecycle.

Practical Usage

Organizations utilize the Cyber Kill Chain framework to enhance their cybersecurity posture by identifying and mitigating risks at each stage of an attack. For instance, during the reconnaissance phase, a company may deploy threat intelligence to identify potential attackers. In the delivery phase, email filtering solutions can block malicious attachments. By mapping security controls to each phase, organizations can prioritize resources effectively and respond to incidents in a timely manner.

Examples

Related Terms

Threat Modeling Incident Response Malware Analysis Security Information and Event Management (SIEM) Defense in Depth
← Back to Glossary