A Trojan virus is created to appear like a valuable program, but when employed, it opens a door for a hacker to obtain a pc's technique. The Trojan virus can locate and activate other malware on the network, steal details, or delete data files. Its scalability and value enable it https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network