Adversary uses malware or a similarly controlled application installed inside an organizational perimeter to gather information about the composition, configuration, and security mechanisms of a targeted application, system or network.
Description
Mitigations
2
Consequences
Relationships
Resources Required
1