A model for analyzing the stages of a cyber attack, from reconnaissance to data exfiltration.