Some protection gurus advocate for the inclusion of an eighth stage in cyber eliminate chains: monetization. This may also be considered as the ultimate aim of the attack, but it especially concentrates on the cybercriminal’s economical obtain from an attack. The attacker can initiate a ransom request – demanding money https://ieeexplore.ieee.org/document/9941250