Using a variety of solutions, threat detection and reaction equipment are created to avoid these evasive cyber threats. Phishing: A method most often employed by cyber criminals since it's straightforward to execute and can make the final results they're searching for with little or no hard work. It is basically https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network