Just about every stage in the cyber eliminate chain is relevant to a certain type of action in a very cyberattack (regardless of whether it’s an internal or exterior attack). The framework presents a scientific technique for knowing the lifecycle of the cyber attack. By mapping out the levels, https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network