Although the authentic seven phases on the cyber destroy chain are already matter to scrutiny, organizations can even now use these concepts that will help improved prepare for current and long term cyberattacks. The Firm can then get action and stop foreseeable future threats with methods including shifting configurations https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network