And also simulating cyber threats through electronic mail, World wide web, and firewall gateways, these platforms can provide you with a chance rating/report of process entities to help you teams recognize critical regions of danger. Responding to cyberattacks by recovering important information and programs in a well timed vogue https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network