Source enhancement: Consists of attackers purchasing or thieving sources to utilize them for any long run attack. And if any adversary (blocking from the organization’s side or any cyber risk avoidance computer software) occurs at any issue inside the cycle or phase then it might split the chain of attack. https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network