The Methodology that traces the steps of Cyber Attacks and used in Cyber Security
Answers
Answered by
1
Answer:
(1)Reconnaissance
(2) Scanning
(3) Access and Escalation
(4) Exhilaration
(5) Sustainment
(6) Assault
(7) Obfuscation
Similar questions