Danger motion intending to maliciously transform or modify persistent knowledge, like records inside a database, along with the alteration of knowledge in transit between two desktops in excess of an open up community, such as the online market place. Pupils, school members and librarians have to log in to the https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network