Resource development: Requires attackers getting or thieving sources to rely on them for the potential attack. Other transformative technologies—Net of factors, DevOps, and robotic system automation—are escalating the attack area in ways that don’t fit with the normal cyber destroy chain model, claims Lavi Lazarovitz, cyber analysis group chief, at https://bookmarkyourpage.com/story2335177/cyber-attack-model-can-be-fun-for-anyone