To make it harder for adversaries to accessibility consumer qualifications, extra credentials need for use. After we perform attack simulations within the process model, the assorted attacks that the method is prone to might be learned and achievable mitigation strategies may be analyzed. The shortest route that may be taken https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network