infrastructure represents tools, technologies and other enablers that support campaign execution and include:
Legacy data base
With the first step we determined which of the competitive vulnerability(s) to attack. With this step we determined the strategy, mission, objective, interaction and isolation tactics and the attack array. Now it’s time to build an attack engine.