Cyber Kill Chain

On the right of the white board are areas where cyber criminals can exploit weak controls to execute code.

  • Drag the correct answers onto the white board.
  • Each correct answer gets 1 point
  • Each incorrect answer looses 1 point

EXPLOITATION is using a vulnerability in the target system to execute code.