They begin to search for certain vulnerabilities within the Group community which they're able to exploit including apps, focus on networks, and so on., and start indicating/mapping out the parts exactly where they can make the most. The moment they properly identify which defenses are set up, they choose which https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network