Different computer network protocols have particular applications and situations. Components of network protocols: Phishing: A method most frequently utilized by cyber criminals since it's straightforward to execute and might create the final results They are trying to find with little effort and hard work. It is largely bogus e-mail, textual https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network