Source enhancement: Consists of attackers buying or thieving means to rely on them for a long term attack. And if any adversary (blocking through the Business’s aspect or any cyber threat avoidance software) occurs at any stage during the cycle or stage then it can break the chain of attack. https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network