Structured Evaluation: The Diamond Model gives a clear, organized way for cybersecurity authorities to composition and course of action information associated with cyber threats and attacks, making it much easier to collaborate and share info. Generally, these actors deploy malware in the procedure by using phishing email messages as well https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network