The initial phase with the cyber protection eliminate chain is reconnaissance, which is essentially the investigate phase in the Procedure. Attackers scope out their goal to recognize any vulnerabilities and potential entry factors. Determine the complex scope of your surroundings plus the dependencies involving the infrastructure along with the https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network