A Trojan virus is designed to seem like a useful method, but when applied, it opens a doorway for your hacker to entry a computer's process. The Trojan virus can locate and activate other malware about the network, steal facts, or delete data files. Made to assist private and non-private https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network