Four million personnel around the world.2 Resource-strained stability groups are specializing in creating detailed cybersecurity strategies that use Highly developed analytics, synthetic intelligence and automation to fight cyberthreats much more proficiently and decrease the effects of cyberattacks. This action displays the dependencies among attack types and small-degree element att... https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network