|
Here, the author is editing an attack scenario, known as a hacker action web. This web
is composed of nodes and edges that allow a hacker to procede from one action to another
based on factors such as the time it will take to perform an action and the network
operation to be performed.
|
|