The most typical Threat vector to get a security compromise is e mail gateways. Hackers make intricate phishing campaigns using recipients’ own info and social engineering methods to trick them and immediate them to destructive Internet sites. Just about all Pc networks have vulnerabilities that go away them open https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network