The seven stages with the cyber destroy chain culminate with action: the final period where cybercriminals execute the fundamental goal from the attack. Lysa Myers started her tenure in malware investigation labs during the weeks ahead of the Melissa virus outbreak in 1999. She has viewed the two the https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network