Software package-described segmentation places network traffic into distinctive classifications and would make implementing security procedures much easier. Ideally, the classifications are depending on endpoint identity, not mere IP addresses. Security orchestration, automation and response answers accumulate and evaluate security facts and permit security groups to determine and exe... https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network