The seven phases of a cyber attack