The first phase on the cyber safety eliminate chain is reconnaissance, which is essentially the research stage in the operation. Attackers scope out their target to identify any vulnerabilities and possible entry factors. Which risk modeling methodology is very best on your technique? The right methodology in your system https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network