A network comprises two or more computational devices related by physical and/or wireless connections. Networks broadly use peer-to-peer or customer-server architecture other than several networking protocols for your related units to communicate with each other. Once the network verifies the identification, the consumer logs in. Authorization then establishes the https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network