Statements (28)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Cybersecurity_Concept
|
| gptkbp:alsoKnownAs |
gptkb:Cyber_Kill_Chain
|
| gptkbp:appliesTo |
gptkb:Advanced_Persistent_Threats
phishing attacks malware attacks |
| gptkbp:describes |
stages of a cyber attack
|
| gptkbp:firstPublished |
2011
|
| gptkbp:influencedBy |
military kill chain
|
| gptkbp:originatedIn |
gptkb:Lockheed_Martin
|
| gptkbp:referencedIn |
gptkb:MITRE_ATT&CK_Framework
NIST SP 800-150 |
| gptkbp:relatedTo |
gptkb:MITRE_ATT&CK
Cyber Threat Intelligence Diamond Model of Intrusion Analysis |
| gptkbp:stageName |
gptkb:Command_and_Control
Delivery Installation Exploitation Reconnaissance Weaponization Actions on Objectives |
| gptkbp:usedFor |
security operations
incident response threat analysis |
| gptkbp:usedIn |
cybersecurity defense
|
| gptkbp:bfsParent |
gptkb:Privilege_Escalation
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Cyber Attack Lifecycle
|