Resource advancement: Includes attackers obtaining or stealing means to use them to get a upcoming attack. Commence by diagramming how information moves from the program, where by it enters the method, the way it is accessed and who can accessibility it. Checklist all software program and various apps within the https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network