The Cyber Kill Chain And How To Identify Indicators Of Compromise