Over the past several a long time, cyberattacks became much more sophisticated, in depth, frequent and harder to protect from. Several cybersecurity experts believe that these attacks will only keep on to improve additional intricate and intense. Two-aspect authentication: A user supplies a username in addition to a password, https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network