When they understand what software your buyers or servers run, including OS Variation and kind, they are able to raise the likelihood of with the ability to exploit and set up something within your community. One example is, stopping an attack during the command and control section (Phase six) https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network