Threat Models Pt.2 (Cyber Kill Chain) Flashcards

1
Q

A ______ _______ is a systematic process to target and engage an adversary to create desired effects.

A

Kill chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enables analysis to detect and mitigate intrusions.

A

Cyber Kill Chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Research, identification, and selection of targets, often represented as crawling internet websites such as conferences proceedings and mailing lists for email addresses, social relationships, or information on specific technologies.

A

Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Coupling a payload with an exploit into a deliverable.

A

Weaponization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Transmission of the weapon to the targeted environment.

A

Delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

After the weapon is delivered to the victim host, ___________ triggers the intruders’ code

A

Exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Installation of malware on the victim system allows the adversary to maintain persistence inside the environment.

A

Installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Typically, compromised hosts must beacon outbound to an internet controller server to establish a C2 channel.

A

Command and Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Only now, after progressing through the first six phases, can intruders take actions to achieve their original objectives.

A

Actions on Objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly