diff --git a/Thesis_Docs/Nikkhah_Nasab-Aida-Mastersthesis.pdf b/Thesis_Docs/Nikkhah_Nasab-Aida-Mastersthesis.pdf
index 57e9e936479246e3583161d00b5b90b6c25469c6..873304bdcbf645d0de5953d5e7ad1eff6062a642 100644
Binary files a/Thesis_Docs/Nikkhah_Nasab-Aida-Mastersthesis.pdf and b/Thesis_Docs/Nikkhah_Nasab-Aida-Mastersthesis.pdf differ
diff --git a/Thesis_Docs/main.tex b/Thesis_Docs/main.tex
index 813ccdc38d692f0afc26f8e6c5aaf6a37a739de3..4afe064800232d3a6e123726f5435ede8fc5a760 100644
--- a/Thesis_Docs/main.tex
+++ b/Thesis_Docs/main.tex
@@ -31,7 +31,7 @@ Advanced Persistent Threats (APTs) represent one of the most sophisticated and d
 \begin{figure}
     \centering
     \includegraphics[width=\textwidth]{../Thesis_Docs/media/apt_attack_lifecycle.png}
-    \caption{APT attack lifecycle \cite{charan2021dmapt}}
+    \caption{7 phases of APT attack lifecycle \cite{charan2021dmapt}}
     \label{fig:apt_attack_lifecycle}
 \end{figure}