Fig. 1. The Course of Defensive Actions in Different Stages of Cyber Kill Chain(Lockheed Martin).
Fig. 2. The Procedure of Technical and Social Engineering Cyber Operations.
Fig. 3. The Concept and Procedure of the Social Engineering Cyber Kill Chain Model
Table 1. The Difference between Lockheed Martin and Proposed Cyber Kill Chain for the Scenario