The initial phase from the cyber stability kill chain is reconnaissance, which is basically the investigation phase of the Procedure. Attackers scope out their concentrate on to recognize any vulnerabilities and likely entry factors. Outline the specialized scope in the natural environment and the dependencies among the infrastructure and https://ieeexplore.ieee.org/document/9941250