To really make it harder for adversaries to access user credentials, extra credentials will need for use. Other transformative technologies—Net of matters, DevOps, and robotic system automation—can also be growing the attack surface in ways that don’t fit with the traditional cyber destroy chain model, states Lavi Lazarovitz, cyber investigate https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network