Each individual Group has a great deal of delicate data to safeguard. Very important enterprise details, prospects’ particular facts, and private documents That ought to not leak outside absolutely are a few examples. The safety of data is just manufactured feasible by implementing valuable network security resources and tactics. The https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network