Attackers usually use stolen login credentials to read safeguarded data files or steal the information while it can be in transit amongst two network equipment. Enforcement fears examining all network targeted visitors flows and should aim to preserve the confidentiality, integrity, and availability of all methods and information to https://ieeexplore.ieee.org/document/9941250