Figure 8-1. Deep atack synchronization matrix NEWSLETTER Join the GlobalSecurity.org mailing list Enter Your Email Address