Preferably, they want a goal that is fairly unguarded and with valuable info. What information the criminals can find about your company, And the way it'd be employed, could surprise you. Spoofing identification: an attacker might achieve entry to the method by pretending to be a certified system consumer. https://ieeexplore.ieee.org/document/9941250