If they really know what software package your end users or servers run, which include OS version and type, they might improve the chance of being able to exploit and put in anything inside your network. Responding to cyberattacks by recovering crucial information and programs in a very timely https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network