Professional Documents
Culture Documents
1. Reconnaissance is the first stage in the Cyber Kill Chain and involves
researching potential targets before carrying out any penetration testing
Identifying potential targets
Finding their vulnerabilities
Discovering which third parties are connected to them (and what data they
can access)
Exploring existing entry points as well as finding new ones.
2. Weaponization: create new types of malware or modify existing tools to use in a
cyberattack
3. Delivery: infiltrate a target’s network and reach users
4. Expoliation:: take advantage of the vulnerabilities they have discovered in
previous stages to further infiltrate a target’s network and achieve their
objectives
5. Installation: Attempt to install malware and other cyberweapons onto the target
network to take control of its systems and exfiltrate valuable data
6. Command & Control: communicate with the malware they’ve installed onto a
target’s network to instruct cyberweapons or tools to carry out their objectives
7. Exfiltration carry out their cyberattack objectives (DDOS, steal sensitive data,
ransomware)
Reference documents:
https://www.dnv.com/cybersecurity/cyber-insights/recognizing-the-seven-stages-
of-a-cyber-attack.html
https://www.eccouncil.org/cybersecurity-exchange/threat-intelligence/cyber-kill-
chain-seven-steps-cyberattack/
What is Cybersecurity
Risk
Risk = Threat x Vulnerabilities x Consequence
CIA triad
ISO-IEC 27001 > ISO27001 define three principles/aspects of information security
Integrity
Confidentiality Availability
1. Confidential
IAM: Identity, Access, Management
2. Integrity
Data can be integrated
3. Availability
Data is accessible