Even if just one Pc is afflicted, the ripple impact could pause functions for untold lengths of time and erode confidence in the Business, the two internally and externally. When the network verifies the id, the user logs in. Authorization then decides the level of access according to network https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network