Whenever they determine what application your users or servers operate, which includes OS Edition and sort, they might boost the chance of having the ability to exploit and set up a thing inside your network. No Business can afford to treat each possible threat as significant to its survival. https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network