They start to look for certain vulnerabilities in the Group community which they're able to exploit for instance programs, goal networks, and so forth., and begin indicating/mapping out the locations the place they will take advantage. After they productively determine which defenses are in place, they choose which weapon is https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network