Problem Statement
Explain the typical stages of a cyber attack lifecycle.
Explanation
A cyber attack usually follows several key stages. First comes reconnaissance, where attackers gather information about the target — like open ports, users, or software versions.
Next is scanning, where they probe for weaknesses. Once a vulnerability is found, they exploit it to gain access. After entering, attackers install backdoors or tools to maintain control and move laterally within the system.
Finally, they achieve their objective — stealing data, disrupting services, or causing damage — and often erase traces to avoid detection. Understanding this cycle helps organizations build defense mechanisms at every stage.
