Various choices for recovering submit-attack to help resumption of standard organization operations with self esteem Spoofing identity: an attacker may achieve access to the system by pretending to get a licensed process user. Reconnaissance is the primary phase within the Cyber Kill Chain and entails studying opportunity targets just https://ieeexplore.ieee.org/document/9941250