Attackers commonly use stolen login credentials to examine guarded information or steal the information although it can be in transit among two network products. Facts Theft: Also known as details exfiltration, facts theft takes place when an attacker takes advantage of their unauthorized entry to get personal information within https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network