This is a dedicated watch page for a single video.
Which of the following phases of MITRE ATT&CK for ICS involves the use of techniques by an attacker to damage, disrupt, or gain control of the data and systems of the targeted ICS environment and its surroundings?