  {"id":823,"date":"2018-06-18T13:12:31","date_gmt":"2018-06-18T17:12:31","guid":{"rendered":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/?p=823"},"modified":"2018-06-18T13:12:31","modified_gmt":"2018-06-18T17:12:31","slug":"steps-cybersecurity-kill-chain-identify-defend","status":"publish","type":"post","link":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/2018\/06\/18\/steps-cybersecurity-kill-chain-identify-defend\/","title":{"rendered":"The Steps of a Cybersecurity Kill Chain: How to Identify and Defend Against It"},"content":{"rendered":"<blockquote><p>A kill chain consists of seven identifiable steps\u00a0(as defined by Lockheed Martin) which cyber criminals go through in order to gain access to an organization, typically by compromising a legitimate user. These steps are followed in order to extract useful data from a victim or their organization.<\/p>\n<p>It&#8217;s important to understand how the kill chain works because timing is everything \u2014 for both the good guys and the bad guys. According to Humphrey Christian, VP of product management at cyber risk management provider Bay Dynamics, the earlier a company can detect<\/p>\n<p>The kill chain steps are as follows:&#8230; <a href=\"https:\/\/www.techrepublic.com\/article\/how-to-identify-and-defend-against-the-steps-of-a-cybersecurity-kill-chain\/\">Read more<\/a> <i class=\"fa fa-long-arrow-right\" style=\"color: #2668d7;\"><\/i><\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>A kill chain consists of seven identifiable steps\u00a0(as defined by Lockheed Martin) which cyber criminals go through in order to gain access to an organization, typically by compromising a legitimate user. These steps are followed in order to extract useful data from a victim or their organization. It&#8217;s important to understand how the kill chain [&hellip;]<\/p>\n","protected":false},"author":57,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-823","post","type-post","status-publish","format-standard","hentry","category-cyber-security-trends"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts\/823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/users\/57"}],"replies":[{"embeddable":true,"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/comments?post=823"}],"version-history":[{"count":1,"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts\/823\/revisions"}],"predecessor-version":[{"id":824,"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts\/823\/revisions\/824"}],"wp:attachment":[{"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/media?parent=823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/categories?post=823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/tags?post=823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}