What does the core of the Diamond Model of Intrusion Analysis represent in the context of a cybersecurity event?
Adversary's motivation and capability
Infrastructure used in the attack
Identity of the victim organization
Type and severity of the vulnerability exploited