Statements (24)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cybersecurity model
|
gptkbp:alsoKnownAs |
gptkb:Cyber_Kill_Chain
|
gptkbp:category |
cyber attack lifecycle
|
gptkbp:describes |
stages of a cyber attack
|
gptkbp:developedBy |
gptkb:Lockheed_Martin
|
gptkbp:focusesOn |
intrusion detection
attack mitigation attack prevention |
https://www.w3.org/2000/01/rdf-schema#label |
Kill Chain
|
gptkbp:influenced |
cyber defense strategies
|
gptkbp:language |
English
|
gptkbp:publishedIn |
2011
|
gptkbp:referencedIn |
gptkb:MITRE_ATT&CK
gptkb:NIST_cybersecurity_framework |
gptkbp:stageName |
delivery
installation art reconnaissance command and control exploitation weaponization actions on objectives |
gptkbp:usedIn |
cybersecurity
|
gptkbp:bfsParent |
gptkb:James_Bond_(Dynamite_series)
|
gptkbp:bfsLayer |
6
|