Net security. This exercise controls staff Net use on an organization's network and equipment, such as blocking specified threats and Web-sites, even though also defending the integrity of an organization's Internet websites themselves. Detect the third layer from the bottom is called Network, but network security will not implement https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network