The seven stages with the cyber kill chain culminate with action: the ultimate phase during which cybercriminals execute the underlying aim in the attack. When running cybersecurity threat, companies typically engage in danger modeling, possibility assessment and attack modeling. Danger modeling discounts with the potential of a negative occasion https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network