A complicated network attack might also result in fines or other penalties Should the Firm is determined to own relied on insufficient or ineffective network security steps. Security info and celebration management collects information and facts from inner security resources, aggregates it in the central log and flags anomalies. https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network