Figure 2

Figure 2: Custom hacker lifecycle for a network.