Another thing to keep in mind: the closer to the beginning with the chain it is possible to prevent an attack, the less high priced and time-consuming the cleanup will be. Subsequent weaponization would be the supply stage — when cybercriminals attempt to infiltrate their goal’s network or security system. https://dftsocial.com/story17642583/cyber-attack-model-things-to-know-before-you-buy