Image for post
Image for post

Lockheed Martin’s Intrusion Kill Chain Model describes seven stages that threat actors take in the course of a cyber breach, from early reconnaissance to the end goal — data exfiltration, data destruction, or some combination of both. The Kill Chain model is a bit of a pariah in the information security world. Some love it (particularly threat hunters and intelligence people). Yet, others have found plenty to criticize about its usefulness in day-to-day security operations. But whether you like it or hate it, the Kill Chain model does offer an interesting taxonomy for the different components of an information attack. …

About

Jason Iacono

Security Analyst, threat researcher, & cyber deception enthusiast. I maintain a constant state of paranoia about cybersecurity, so that you don’t have to.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store