A Trojan virus is built to look like a valuable plan, but when employed, it opens a doorway for any hacker to accessibility a computer's method. The Trojan virus can Identify and activate other malware to the network, steal data, or delete data files. Its scalability and usability allow it https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network