Back to cyber security page
Gathering information about potential target
Examine network and use info gained in reconnaissance step
Gain access of system by attacking
Keeping access for further hacking / penetration
Covering tracks and deleting logs