Computer Science, asked by AryanshiBarua, 1 month ago

The Methodology that traces the steps of Cyber Attacks and used in Cyber Security​

Answers

Answered by at8620280
1

Answer:

(1)Reconnaissance

(2) Scanning

(3) Access and Escalation

(4) Exhilaration

(5) Sustainment

(6) Assault

(7) Obfuscation

Similar questions