Attackers regularly use stolen login qualifications to browse safeguarded documents or steal the data although it can be in transit concerning two network devices. Even though a vulnerability does not assurance that an attacker or hacker will focus on your network, it does help it become a lot easier https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network