Attackers commonly use stolen login credentials to examine secured information or steal the info even though it really is in transit between two network equipment. Nonetheless, Individuals cloud features can continue to be thought of Element of the general company network, and securing them is an element of network https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network