They begin to look for certain vulnerabilities within the Business network which they will exploit including apps, target networks, and so on., and start indicating/mapping out the areas exactly where they might take advantage. As soon as they efficiently recognize which defenses are in place, they decide on which weapon https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network