The most typical Hazard vector for any security compromise is email gateways. Hackers make intricate phishing strategies using recipients’ personalized facts and social engineering strategies to trick them and immediate them to destructive Sites. Workforce now typically use several instruments and purposes to carry out business productively. Coverage driven https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network