The initial stage from the cyber safety kill chain is reconnaissance, which is actually the investigation stage from the Procedure. Attackers scope out their concentrate on to establish any vulnerabilities and probable entry factors. When running cybersecurity danger, businesses usually engage in threat modeling, possibility assessment and attack modeling. https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network