Attackers usually use stolen login qualifications to examine guarded data files or steal the data though it is actually in transit involving two network units. As soon as the network verifies the identity, the user logs in. Authorization then establishes the level of entry according to network guidelines. four https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network