The commonest Hazard vector for any security compromise is e-mail gateways. Hackers produce intricate phishing strategies using recipients’ private data and social engineering strategies to trick them and direct them to malicious websites. Security orchestration, automation and reaction alternatives obtain and analyze security details and permit security groups to https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network