The 7 phases in the cyber destroy chain culminate with action: the final section where cybercriminals execute the fundamental aim of the attack. When managing cybersecurity chance, businesses usually have interaction in menace modeling, threat evaluation and attack modeling. Danger modeling promotions with the potential for a unfavorable party https://ieeexplore.ieee.org/document/9941250