If they really know what software program your end users or servers operate, which include OS Model and type, they can improve the probability of being able to exploit and set up one thing within your community. Start out by diagramming how facts moves throughout the system, where it enters https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network