Step Procedure:
- Start by searching for “Cyber Kill Chain Model” or “MITRE Matrix” using a
search engine (e.g. Google). - Browse through the search results to find websites that explain or
provide information about these concepts. - Read about the Cyber Kill Chain Model and the MITRE Matrix in order to
understand their definitions, components, and uses. - Take notes on the key points and main ideas presented in the
information you find. - Consider searching for additional resources or materials that may
provide more in-depth information on the Cyber Kill Chain Model and
the MITRE Matrix.
Reference blog:
ï‚· For the Cyber Kill Chain Model:
o “The Cyber Kill Chain: How Hackers Breach Your Network”
(https://www.tripwire.com/state-of-security/security-data-
protection/the-cyber-kill-chain-how-hackers-breach-your-
network/)
o “Understanding the Cyber Kill Chain”
(https://www.paloaltonetworks.com/cyberpedia/understanding-
the-cyber-kill-chain)
o “The Cyber Kill Chain: An Overview”
(https://www.cisecurity.org/blog/the-cyber-kill-chain-an-
overview/)
For the MITRE Matrix Reference:
o “MITRE Matrix: A Comprehensive Guide to the MITRE Attack
Framework” (https://www.accurics.com/blog/mitre-matrix-a-
comprehensive-guide-to-the-mitre-attack-framework)
o “MITRE ATT&CK Framework: A Comprehensive Guide”
(https://www.exabeam.com/mitre-attck-framework-guide/)
o “The MITRE ATT&CK Framework: What You Need to Know”
(https://www.fireeye.com/blog/threat-research/2017/10/mitre-
attck-framework-what-you-need-to-know.html)