The very first phase with the cyber protection get rid of chain is reconnaissance, which is actually the investigation stage on the Procedure. Attackers scope out their focus on to detect any vulnerabilities and opportunity entry details. We then labored with our university partners--DePaul College, University of Washington, as https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network