Should they really know what computer software your people or servers run, such as OS Model and sort, they can boost the likelihood of being able to exploit and put in one thing in your network. Existing critiques may be bucketed into two principal classes: perimeter protection and attack https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network