Attackers commonly use stolen login credentials to examine secured data files or steal the information although it can be in transit amongst two network devices. Network security is enforced utilizing a combination of components and software resources. The main objective of network security is to forestall unauthorized obtain into https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network