Software-outlined segmentation puts network visitors into unique classifications and tends to make enforcing security insurance policies simpler. Ideally, the classifications are based on endpoint identity, not mere IP addresses. Bodily shield your servers and your units. Maintain them in a secure locale, and do not grant standard usage of https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network