They begin to look for certain vulnerabilities inside the Group network which they can exploit including apps, concentrate on networks, etcetera., and start indicating/mapping out the places wherever they are able to make the most. At the time they effectively determine which defenses are set up, they pick out which https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network