<P> Computer scientists at Lockheed - Martin corporation described a new "intrusion kill chain" framework or model to defend computer networks in 2011 . They wrote that attacks may occur in stages and can be disrupted through controls established at each stage . Since then, the "cyber kill chain" has been adopted by data security organizations to define stages of cyber-attacks . </P> <P> A cyber kill chain reveals the stages of a cyberattack: from early reconnaissance to the goal of data exfiltration . The kill chain can also be used as a management tool to help continuously improve network defense . Threats must progress through several stages in the model, including: </P> <Ol> <Li> Reconnaissance: Intruder selects target, researches it, and attempts to identify vulnerabilities in the target network . </Li> <Li> Weaponization: Intruder creates remote access malware weapon, such as a virus or worm, tailored to one or more vulnerabilities . </Li> <Li> Delivery: Intruder transmits weapon to target (e.g., via e-mail attachments, websites or USB drives) </Li> <Li> Exploitation: Malware weapon's program code triggers, which takes action on target network to exploit vulnerability . </Li> <Li> Installation: Malware weapon installs access point (e.g., "backdoor") usable by intruder . </Li> <Li> Command and Control: Malware enables intruder to have "hands on the keyboard" persistent access to target network . </Li> <Li> Actions on Objective: Intruder takes action to achieve their goals, such as data exfiltration, data destruction, or encryption for ransom . </Li> </Ol> <Li> Reconnaissance: Intruder selects target, researches it, and attempts to identify vulnerabilities in the target network . </Li>

Arrange the seven stages of the cyber kill chain in order
find me the text answering this question