Knowledge the actions attackers just take is important to determine a approach to forestall this sort of attacks and mitigate dangers. Knowing the levels of the focused attack lifecycle is step one. Unique attack models are utilized for other cryptographic primitives, or more generally for all form of security systems. https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network