Every phase of the cyber eliminate chain is connected with a particular sort of activity inside of a cyberattack (regardless of whether it’s an interior or exterior attack). Spoofing identification: an attacker might attain usage of the method by pretending being a licensed procedure person. Moreover, it doesn't account https://ieeexplore.ieee.org/document/9941250