Each and every stage with the cyber destroy chain is relevant to a specific sort of exercise inside of a cyberattack (irrespective of whether it’s an interior or exterior attack). Spoofing identity: an attacker may achieve entry to the procedure by pretending to become an authorized program consumer. A https://ieeexplore.ieee.org/document/9941250