Process of Attacks Research, Pair remote access Deliver cyberweapons Install payloads to identify and malware with exploits by email, website and gain persistent select targets attachments access