Statements (29)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cybersecurity model
|
gptkbp:appliesTo |
network security
enterprise security |
gptkbp:category |
cyber attack lifecycle
|
gptkbp:consistsOfStep |
delivery
installation art reconnaissance command and control exploitation weaponization actions on objectives |
gptkbp:criticizedFor |
linear approach
focus on perimeter defenses |
gptkbp:developedBy |
gptkb:Lockheed_Martin
|
gptkbp:documentedIn |
Lockheed Martin white paper
|
gptkbp:focusesOn |
advanced persistent threats
|
gptkbp:hasStepCount |
7
|
https://www.w3.org/2000/01/rdf-schema#label |
Cyber Kill Chain
|
gptkbp:influenced |
gptkb:MITRE_ATT&CK_framework
|
gptkbp:introducedIn |
2011
|
gptkbp:purpose |
analyze cyber attacks
improve defense strategies |
gptkbp:relatedTo |
intrusion kill chain
|
gptkbp:usedIn |
security operations
incident response threat intelligence |
gptkbp:bfsParent |
gptkb:Cyber_Attack_Lifecycle
gptkb:Kill_Chain |
gptkbp:bfsLayer |
7
|