We evaluate this situation with regards to the attack steps. 1st, the Attackers gained entry to the OfficeComputer in two approaches. A single group done an attack on externalRemoteServices, the place a Sonicwall SSL/VPN exploit was uncovered, and so they performed the exploitationOfRemoteServices to attack the infectedComputer and enter the https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network