Notifications
Clear all
Topic starter
22/10/2022 12:50 am
A cybersecurity analyst is dissecting an intrusion down to the specific techniques and wants to organize them in a logical manner.
Which of the following frameworks would BEST apply in this situation?
- A . Pyramid of Pain
- B . MITRE ATT&CK
- C . Diamond Model of Intrusion Analysts
- D . CVSS v3.0
Suggested Answer: B