A cybersecurity analyst is dissecting an intrusion down to the specific techniques and wants to organize them in a logical manner.
Which of the following frameworks would BEST apply in this situation?
A . Pyramid of Pain
B . MITRE ATT&CK
C . Diamond Model of Intrusion Analysts
D . CVSS v3.0
Answer: B