Figure 2
Figure 2: Custom hacker lifecycle for a network.
Figure 2: Custom hacker lifecycle for a network.