Pages

Categories

Search

 

DHS enhanced analysis of Grizzly Steppe election hack

by
February 11, 2017
OODA Loop
No Comment

DHS analysts leverage the Cyber Kill Chain model to analyze, discuss, and dissect malicious cyber activity. The phases of the Cyber Kill Chain are Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, and Actions on the Objective. This section will provide a high-level overview of GRIZZLY STEPPE activity within this