The most important vulnerabilities may have speedy awareness so as to add security controls. The minimum significant vulnerabilities might need no consideration in any respect because There exists very little possibility They are going to be exploited or they pose little Threat When they are. This perform aims to produce https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network