The commonest danger vector for any security compromise is email gateways. Hackers create intricate phishing strategies working with recipients’ particular information and facts and social engineering methods to trick them and direct them to destructive websites. Network security is enforced applying a mix of hardware and program instruments. The https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network