This is a dedicated watch page for a single video.
In which of the following phases of MITRE ATT&CK for ICS does an attacker use various methods to gather information and gain knowledge regarding the data and domains of the target ICS infrastructure?