Each individual phase from the cyber destroy chain is related to a selected sort of exercise in a very cyberattack (regardless of whether it’s an inside or external attack). When you don’t quit the attack until it’s by now inside your community, you’ll need to deal with those machines https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network