Resource growth: Involves attackers obtaining or thieving sources to utilize them for a potential attack. Spoofing identification: an attacker may achieve entry to the program by pretending for being an authorized system consumer. Not amazingly, a current examine identified that the worldwide cybersecurity worker hole—the hole involving existing cybersecurity staff https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network