If they really know what software package your buyers or servers operate, which include OS Model and kind, they might boost the likelihood of with the ability to exploit and set up anything in your network. We are interested in developing this hybrid method and piloting it with organizations https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network