Another thing to bear in mind: the nearer to the beginning of the chain you could prevent an attack, the fewer costly and time-consuming the cleanup will be. Start out by diagramming how facts moves in the procedure, in which it enters the technique, the way it is accessed and https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network