A threat intelligence analyst is updating a document according to the MITRE ATT&CK framework. The analyst detects the following behavior from a malicious actor:
“The malicious actor will attempt to achieve unauthorized access to the vulnerable system.”
In which of the following phases should the analyst include the detection?
ada26b1
3 weeks ago