Scan QR code or get instant email to install app
Question:
In the Cyber Kill Chain model, anti-forensics activities align with the concept of lateral movement. Once an attacker has executed their attack, they will likely seek to conceal any evidence of their actions. Subsequently, they may engage in denial-of-service or exfiltration activities, as depicted in the model.
Comments