When they really know what program your consumers or servers operate, which include OS version and kind, they're able to boost the likelihood of with the ability to exploit and install some thing in just your network. This activity exhibits the dependencies among attack categories and very low-degree ingredient characteristics. https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network