Zero-have faith in security: This consists of the basic principle of “never ever have faith in, usually confirm” when selecting who and what can access your network as well as methods to use to make certain persons and programs are whatever they claim being. Phishing: A method most frequently used https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network