To make it more durable for adversaries to accessibility person qualifications, further credentials want to be used. This action shows the dependencies amongst attack categories and minimal-amount part characteristics. After that, the CVSS system is utilized and scores are calculated to the elements during the tree. Security consciousness training coupled https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network