When they determine what program your end users or servers operate, like OS version and type, they could boost the chance of being able to exploit and install something within just your network. This exercise reveals the dependencies amid attack categories and lower-degree element characteristics. Following that, the CVSS strategy https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network