Each and every phase of the cyber kill chain is associated with a particular form of action inside of a cyberattack (regardless of whether it’s an internal or external attack). Define the technological scope with the natural environment along with the dependencies concerning the infrastructure and the software package https://ieeexplore.ieee.org/document/9941250