The steps described in the cyber kill chain certainly are a ton just like a stereotypical theft. The thief will carry out reconnaissance on the setting up before attempting to infiltrate it, and then experience numerous far more steps before you make off with the loot. Persona non Grata (PnG) https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network