They start to look for sure vulnerabilities throughout the Group network which they will exploit such as apps, focus on networks, etcetera., and start indicating/mapping out the areas in which they could take advantage. When they effectively determine which defenses are in place, they pick which weapon is greatest for https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network