2020
In the course of work, we cover all existing environments to simulate all possible attack vectors, created by potential hackers.