Network Service Scanning. Adversaries might try and attain an index of network services operating in an enterprise method by using network and vulnerability scanners, e.g. Extensive (Visible, agile, and straightforward threat) modeling is made of strategies and processes that could be very easily scaled and adapted to any scope or https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network