Should they really know what software program your end users or servers run, which includes OS version and kind, they might boost the likelihood of with the ability to exploit and install a thing in your network. Spoofing identity: an attacker may obtain entry to the program by pretending https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network