Skip to main content
. 2022 Nov 2;82(11):16951–16971. doi: 10.1007/s11042-022-14036-y

Table 4.

Vulnerability exploitation flatten

Vulnerability Level Knowledge Level Incognito
1) No knowledge of computer level 0 None
2) Primary education level 1 Not enough
3) Secondary education level 2 Not enough
4) High school level 3 Not enough
5) Intermediate school level 4 Not enough
6) B-tech in computer science level 4 Script
7) M-tech in computer science level 5 Amateur
8) MPhil in computer level 6 Amateur
9) Ph.D. in computers level 7 Hacker
10) Postdoc in computer level 8 Good hacker
A) Ph.D. and post-doc level 9 Better hacker
B) High knowledge of computer level 10 Best hacker
C) Criminal record in cyberspace Level expert Expert/Criminal hacker