The 7 phases of the cyber kill chain culminate with action: the final period where cybercriminals execute the underlying aim from the attack. Such as, stopping an attack while in the command and Regulate period (Period 6) normally requires extra Superior, high-priced and time-consuming endeavours. This may consist of https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network