Figure 3: Diagram of the attack cycle Let’s look at a concrete example where the Azure ... their files, and many other things ...