Statements (29)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:cybersecurity_model
|
| gptkbp:appliesTo |
network security
enterprise security |
| gptkbp:category |
cyber attack lifecycle
|
| gptkbp:consistsOfStep |
gptkb:installation_art
delivery reconnaissance command and control exploitation weaponization actions on objectives |
| gptkbp:criticizedFor |
linear approach
focus on perimeter defenses |
| gptkbp:developedBy |
gptkb:Lockheed_Martin
|
| gptkbp:documentedIn |
Lockheed Martin white paper
|
| gptkbp:focusesOn |
advanced persistent threats
|
| gptkbp:hasStepCount |
7
|
| gptkbp:influenced |
gptkb:MITRE_ATT&CK_framework
|
| gptkbp:introducedIn |
2011
|
| gptkbp:purpose |
analyze cyber attacks
improve defense strategies |
| gptkbp:relatedTo |
intrusion kill chain
|
| gptkbp:usedIn |
security operations
incident response threat intelligence |
| gptkbp:bfsParent |
gptkb:Cyber_Attack_Lifecycle
gptkb:Kill_Chain |
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
Cyber Kill Chain
|