Lockheed Martin Cyber Kill Chain

somdn_product_page

(Downloads - 0)

For more info about our services contact : help@bestpfe.com

Table of contents

1. Introduction
1.1. Problem Statement & Research Question
1.2. Purpose and Significance of the Thesis
1.3. Research Field / Theme / Scope
1.4. Structure of the Thesis
2. Theory
2.1. Information Security
2.1.1. Information Security Awareness and Training (ISAT)
2.2. Lockheed Martin Cyber Kill Chain
2.3. Related Work
3. Research Method
3.1. Planning
3.1.1. Protocol:
3.2. Selection
3.2.1. Searching for the literature
3.2.2. Practical screen
3.3. Extraction
3.3.1. Quality appraisal
3.3.2. Data extraction:
3.4. Execution
3.4.1. Synthesis of studies and Writing the review
3.5. Research Tools
4. Article Overview
5. Results
5.1. Reconnaissance
5.2. Weaponization
5.3. Delivery
5.4. Exploitation
5.5. Installation
5.6. Command and Control (C2)
5.7. Actions on Objectives
6. Discussion
6.1. Limitations of the research
6.2. Future Research Reccomendations
7. Conclusion
References

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *