It will eventually contain defense for all hardware units, software program purposes and endpoints, in addition to the network itself and its different factors, like Bodily or cloud-based facts facilities. Adversarial Nations and prison hackers are previously making use of AI and MI as tools to locate and exploit vulnerabilities https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network