It can incorporate defense for all hardware systems, computer software applications and endpoints, as well as the network itself and its various elements, including Actual physical or cloud-based mostly data centers. Phishing: A technique most often used by cyber criminals as it's simple to execute and might produce the effects https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network