The most typical danger vector to get a security compromise is email gateways. Hackers make intricate phishing strategies using recipients’ own data and social engineering strategies to trick them and direct them to malicious Internet websites. They may be positioned in various places around the network. Up coming-generation firewalls https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network