Attackers often use stolen login credentials to go through shielded data files or steal the data while it can be in transit concerning two network gadgets. Personnel currently normally use a number of applications and programs to carry out small business productively. Policy driven through the organization’s society supports https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network