To really make it harder for adversaries to accessibility person credentials, added qualifications will need for use. Following weaponization may be the supply phase — when cybercriminals make an effort to infiltrate their goal’s community or safety procedure. The initial Lockheed Martin cyber destroy chain model describes 7 ways. Here https://ieeexplore.ieee.org/document/9941250