According to attack lifecycle models, what is the attacker’s first step in compromising an organization?
Privilege Escalation
Exploitation
Initial Compromise
Reconnaissance
Submit