… Jason Kick This paper provides an overview of the cyber exercise process from inception to reporting. It introduces the terminology and life cycle of a cyber exercise and then focuses … by placing a note in the on-screen txt editor that the computer has been compromised and to contact cyber security. 01, 02, 04, 07, 08, 09, 10, 12 02, 03, 06, 07, 08, 10 IA-7 Frequency … exercise audience and generate a better final report. Email Address List exerciseleader@yahoo.com -account used to send spearphishing email from unita@yahoo.com - email account for Exercise …