Statements (28)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Cybersecurity Concept
|
gptkbp:alsoKnownAs |
gptkb:Cyber_Kill_Chain
|
gptkbp:appliesTo |
gptkb:Advanced_Persistent_Threats
phishing attacks malware attacks |
gptkbp:describes |
stages of a cyber attack
|
gptkbp:firstPublished |
2011
|
https://www.w3.org/2000/01/rdf-schema#label |
Cyber Attack Lifecycle
|
gptkbp:influencedBy |
military kill chain
|
gptkbp:originatedIn |
gptkb:Lockheed_Martin
|
gptkbp:referencedIn |
gptkb:MITRE_ATT&CK_Framework
NIST SP 800-150 |
gptkbp:relatedTo |
gptkb:MITRE_ATT&CK
Cyber Threat Intelligence Diamond Model of Intrusion Analysis |
gptkbp:stageName |
gptkb:Command_and_Control
Delivery Installation Exploitation Reconnaissance Weaponization Actions on Objectives |
gptkbp:usedFor |
security operations
incident response threat analysis |
gptkbp:usedIn |
cybersecurity defense
|
gptkbp:bfsParent |
gptkb:Privilege_Escalation
|
gptkbp:bfsLayer |
6
|