The commonest Risk vector to get a security compromise is e-mail gateways. Hackers produce intricate phishing campaigns employing recipients’ personal details and social engineering techniques to trick them and direct them to malicious Internet websites. Security orchestration, automation and response answers accumulate and examine security data and allow security https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network