Which attack methodology framework categorizes cyber intrusions into steps such as reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives?
The cyber kill chain is a model developed by Lockheed Martin to understand the structure of cyber attacks. It breaks down the phases of a cyber attack into distinct steps—reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives—providing a comprehensive view of an attack lifecycle to help in detection and response.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the reconnaissance phase in the cyber kill chain?
Open an interactive chat with Bash
How does weaponization work in the cyber kill chain?
Open an interactive chat with Bash
What does command and control (C2) mean in the cyber kill chain?