DESCRIBE the cyber kill chain and how it is used.docx
1. DESCRIBE the cyber kill chain and how it is used
Cyber kill Chain The most popular attack vector today follows the path outlined in the
Lockheed Martin Cyber Kill Chain. It is important to understand how threat actors plan and
attack information resources. Respond to the following in a minimum of 250 words:
DESCRIBE the cyber kill chain and how it is used to bypass perimeter defenses. Be sure to
describe each link in the chain as you step through the attack process. DESCRIBE two ways
to break the chain Refer to video link below and any other references.