The 7 Essential Steps of the Cybersecurity Kill-Chain Process