A conceptual model that outlines the 7 sequential stages of a cyber attack that can be used to understand, detect, and defend against adversaries by developing more comprehensive security strategies.