Name 7 Steps of Cyber Kill Chain
Name 4 Diamond Model Nodes
Adversary - Threat actor responsible for threat or exploit
Capability - Tools or techniques used by the threat actor
Infrastructure - The physical or logical communication structure used to maintain and control capabilities
Victim - Adversary’s target
Describe Chain of Custody
The chronological paper trail that describes the exact time each person took possession of specific evidence.