Relationships between compromised and attacker-controlled assets. Source: Dell Secureworks.