Which attack methodology framework categorizes cyber intrusions into steps such as reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives?
Diamond Model of Intrusion Analysis
Cyber kill chain
Open Source Security Testing Methodology Manual
MITRE ATT&CK