A Trojan virus is meant to look like a beneficial plan, but when employed, it opens a doorway for any hacker to entry a computer's method. The Trojan virus can Find and activate other malware on the network, steal information, or delete files. In addition to real-time security versus virus https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network