The most common danger vector to get a security compromise is e mail gateways. Hackers generate intricate phishing campaigns making use of recipients’ individual information and social engineering strategies to trick them and direct them to malicious Sites. Security orchestration, automation and reaction methods gather and assess security knowledge https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network