Investigate East-West Attack Activities to Defend Critical Assets: A SANS Review