Match the Cyber-Attack Lifecycle stage to its correct description