Statements (24)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:cybersecurity_model
|
| gptkbp:alsoKnownAs |
gptkb:Cyber_Kill_Chain
|
| gptkbp:category |
cyber attack lifecycle
|
| gptkbp:describes |
stages of a cyber attack
|
| gptkbp:developedBy |
gptkb:Lockheed_Martin
|
| gptkbp:focusesOn |
intrusion detection
attack mitigation attack prevention |
| gptkbp:influenced |
cyber defense strategies
|
| gptkbp:language |
English
|
| gptkbp:publishedIn |
2011
|
| gptkbp:referencedIn |
gptkb:MITRE_ATT&CK
gptkb:NIST_cybersecurity_framework |
| gptkbp:stageName |
gptkb:installation_art
delivery reconnaissance command and control exploitation weaponization actions on objectives |
| gptkbp:usedIn |
cybersecurity
|
| gptkbp:bfsParent |
gptkb:James_Bond_(Dynamite_series)
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Kill Chain
|