The initial phase in the cyber stability eliminate chain is reconnaissance, which is essentially the investigate stage with the Procedure. Attackers scope out their goal to determine any vulnerabilities and opportunity entry factors. Spoofing identification: an attacker could obtain use of the technique by pretending to get a licensed https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network