They start to look for certain vulnerabilities in the Business community which they might exploit including purposes, focus on networks, and so forth., and start indicating/mapping out the places in which they will make the most. At the time they properly identify which defenses are in place, they select which https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network