A network comprises two or more computational systems related by physical and/or wireless connections. Networks broadly use peer-to-peer or consumer-server architecture besides several networking protocols with the related methods to talk to one another. When the network verifies the id, the consumer logs in. Authorization then determines the extent https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network