Zero-have confidence in security: This consists of the principle of “hardly ever trust, often validate” when choosing who and what can access your network and the methods to use to make sure men and women and units are the things they claim to be. Enhanced connectivity and ineffective security controls https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network