The cyber-attacker successfully breaks into the environment and begins coming around to find something useful – intellectual property, banking account credentials, company plans, what ever. The attacker makes their way to a certain host on the network node to browse the particular directories, and suddenly, his / her connection is cut off. The particular stolen username and password he obtained no longer works. Unknowingly,