Chapter 6: Integrity and Security
Targeted intrusion Reconnaissance Exfiltration Command and control Data collection and staging You’ve been hacked!