The term Cyber Kill Chain has been widely used by the security community to describe the different stages of cyber attacks. It’s a compelling model, easy to understand and, lets face it, the name sounds really cool. But the actual scope of cyberthreats extends far beyond that of the Cyber Kill chain. The Chain is disproportionate on an attack time scale: Steps 1 through 6 take relatively little time, whereas step 7 can take months. Intrusion based on remote access, in which no malware or payload is involved, is far, longer than those covered by the Chain. We’re not afraid to say it can actually be detrimental to security.”]
Source: https://www.darkreading.com/attacks-breaches/deconstructing-the-cyber-kill-chain

