Denial of service: the attacker exhausts the resources essential to offer products and services to respectable end users. Start off by diagramming how data moves from the technique, where it enters the procedure, how it is accessed and who will obtain it. Listing all computer software and other applications during https://ieeexplore.ieee.org/document/9941250