It is because adversaries may use distinctive procedures based upon components like their abilities sets, targets’ procedure configuration aned availability of suitable instruments. Learners, faculty members and librarians have to log in to the faculty library Web page in advance of they can carry out any in the use conditions. https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network