Although the authentic seven phases on the cyber destroy chain are actually subject matter to scrutiny, companies can nonetheless use these concepts to assist far better prepare for existing and future cyberattacks. Insider threats pose a substantial threat to companies, but they don't seem to be accounted for in https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network