The initial phase from the cyber security destroy chain is reconnaissance, which is actually the study stage from the Procedure. Attackers scope out their concentrate on to discover any vulnerabilities and potential entry factors. Responding to cyberattacks by recovering essential details and methods inside of a well timed fashion https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network