The primary phase from the cyber protection kill chain is reconnaissance, which is basically the research stage in the Procedure. Attackers scope out their target to determine any vulnerabilities and possible entry factors. For example, stopping an attack during the command and control section (Phase 6) normally involves extra https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network