#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

What are the steps in intrusion model?

Answer

Recon, Weaponise, Deliver, Exploit, Install, C2 and Action