The seven levels in the cyber destroy chain culminate with action: the ultimate phase through which cybercriminals execute the underlying aim with the attack. The Typical Vulnerability Scoring Method (CVSS) assigns a severity score to each vulnerability. This combines its intrinsic vulnerability, the evolution of the vulnerability over time https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network