The Cyber Kill Chain: Understanding the 7 Steps
Developed by Lockheed Martin, the Cyber Kill Chain was one of the first frameworks to define the stages of a cyber intrusion. It is based on military concepts and remains a vital m...
Your comprehensive reference for cyber threat intelligence terminology. Explore definitions of malware families, APT groups, attack techniques, and security concepts.
Showing 6 entries starting with T
Clear filtersDeveloped by Lockheed Martin, the Cyber Kill Chain was one of the first frameworks to define the stages of a cyber intrusion. It is based on military concepts and remains a vital m...
While the Cyber Kill Chain focuses on the stages of an attack, and MITRE ATT&CK focuses on the behaviors, the Diamond Model focuses on the relationships.
The Intelligence Cycle is the foundational framework used by government agencies and cybersecurity teams to turn raw data into actionable insights. Following this cycle prevents th...
Threat Hunting is the proactive search for cyber threats that are lurking undetected in a network. Unlike Incident Response, which reacts to an alert, hunting starts with an assump...
Threat Modeling is a proactive process of identifying potential threats to a system, determining the risk they pose, and designing mitigations. Unlike CTI which often focuses on ex...
In the Intelligence Cycle, the Dissemination phase is critical. However, not all intelligence is meant for public consumption. Sharing a sensitive report about a nation-state actor...