Every single phase in the cyber get rid of chain is connected with a certain style of exercise in the cyberattack (irrespective of whether it’s an interior or exterior attack). Spoofing identification: an attacker may perhaps acquire usage of the program by pretending to get an authorized system consumer. https://ieeexplore.ieee.org/document/9941250