The Cyber Kill Chain breaks attacks into stages. Disrupting any stage stops the attack.
Reconnaissance. Attackers research targets.
Weaponization. Attackers create exploits.
Delivery. Payload sent via email, web, or USB. Filter inbound content.
Exploitation. Vulnerabilities triggered. Keep systems patched.
Installation. Persistent access installed. Monitor file changes.
Command and Control. Communication established. Monitor outbound traffic.
Actions on Objective. Goal achieved. Protect valuable assets with extra layers.