Attackers routinely use stolen login qualifications to go through safeguarded information or steal the information when it can be in transit between two network products. Security orchestration, automation and response options accumulate and analyze security data and allow security teams to determine and execute automated responses to cyberthreats. Virtual https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network