August 2018
Intermediate to advanced
512 pages
17h 18m
English
• 22.1 Situation Understanding Interplay with Command and Control
• 22.2 Situation-Based Decision Making: The OODA Loop
• 22.3 Grasping the Nature of the Attack
• 22.3.1 What Vulnerability Is It Exploiting?
• 22.3.2 Which Paths Are the Attacks Using?
• 22.3.3 Are the Paths Still Open?
• 22.3.4 How Can the Infiltration, Exfiltration, and Propagation Paths Be Closed?
• 22.4 The Implication to Mission
• 22.4.3 Nature and Locus Guiding Defense
• 22.5 Assessing Attack Damages