The data are compressed In line with a program or algorithm, and transmission is often prevented by utilizing Community Intrusion Avoidance to block particular file kinds for instance ZIP files. Spoofing identity: an attacker may well obtain entry to the method by pretending to generally be a licensed technique user. https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network