A network comprises two or more computational programs related by physical and/or wireless connections. Networks broadly use peer-to-peer or customer-server architecture apart from many networking protocols with the linked devices to communicate with each other. When the network verifies the identification, the user logs in. Authorization then decides the https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network