Cyber Attack Lifecycle

GPTKB entity

Statements (28)
Predicate Object
gptkbp:instanceOf Cybersecurity Concept
gptkbp:alsoKnownAs gptkb:Cyber_Kill_Chain
gptkbp:appliesTo gptkb:Advanced_Persistent_Threats
phishing attacks
malware attacks
gptkbp:describes stages of a cyber attack
gptkbp:firstPublished 2011
https://www.w3.org/2000/01/rdf-schema#label Cyber Attack Lifecycle
gptkbp:influencedBy military kill chain
gptkbp:originatedIn gptkb:Lockheed_Martin
gptkbp:referencedIn gptkb:MITRE_ATT&CK_Framework
NIST SP 800-150
gptkbp:relatedTo gptkb:MITRE_ATT&CK
Cyber Threat Intelligence
Diamond Model of Intrusion Analysis
gptkbp:stageName gptkb:Command_and_Control
Delivery
Installation
Exploitation
Reconnaissance
Weaponization
Actions on Objectives
gptkbp:usedFor security operations
incident response
threat analysis
gptkbp:usedIn cybersecurity defense
gptkbp:bfsParent gptkb:Privilege_Escalation
gptkbp:bfsLayer 6