Zero-belief security: This will involve the principle of “under no circumstances have faith in, usually confirm” when deciding who and what can entry your network and the ways to use to verify men and women and methods are the things they claim to be. Often accomplished in coordination with phishing, https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network