Decoding The Diamond Model Of Intrusion Analysis