Persistence. The footholds obtained by adversaries by Initial Obtain in just an enterprise system could possibly be eliminated when end users change their passwords. To keep up access, adversaries may well hijack legit code on the sufferer technique to stay and move deeper in to the process. Application danger models https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network