The initial phase with the cyber security eliminate chain is reconnaissance, which is actually the research phase in the operation. Attackers scope out their focus on to discover any vulnerabilities and possible entry details. For instance, stopping an attack in the command and Management stage (Section 6) commonly involves https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network