Four million employees around the world.two Source-strained protection teams are concentrating on creating comprehensive cybersecurity techniques that use advanced analytics, artificial intelligence and automation to battle cyberthreats more proficiently and lower the impact of cyberattacks. This activity exhibits the dependencies among the attack classes and very low-amount component... https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network