A Trojan virus is designed to look like a handy application, but when utilised, it opens a door to get a hacker to entry a computer's procedure. The Trojan virus can locate and activate other malware around the network, steal facts, or delete files. Deception technological innovation, which protects in https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network