The most common Hazard vector for any security compromise is email gateways. Hackers develop intricate phishing strategies utilizing recipients’ particular data and social engineering methods to trick them and immediate them to destructive Internet sites. Detect that the 3rd layer from The underside is called Network, but network security https://ieeexplore.ieee.org/document/9941250