Whenever they know what program your people or servers operate, including OS Model and type, they will increase the probability of with the ability to exploit and put in anything within your network. Once we carry out attack simulations about the system model, the varied attacks the procedure is vulnerable https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network