Cyber kill Chain
The most popular attack vector today follows the path outlined in the Lockheed Martin Cyber Kill Chain. It is important to understand how threat actors plan and attack information resources.
Respond to the following in a minimum of 250 words:
DESCRIBE the cyber kill chain and how it is used to bypass perimeter defenses. Be sure to describe each link in the chain as you step through the attack process.
DESCRIBE two ways to break the chain
Refer to video link below and any other references.