Knowing the techniques attackers consider is important to establish a approach to circumvent these attacks and mitigate hazards. Knowledge the stages of a focused attack lifecycle is the initial step. Enterprise systems are developing in complexity, plus the adoption of cloud and mobile services has enormously improved the attack surface https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network