Attainable defenses to interrupt this attack, which can be applied to enhance the protection standard of the procedure, are indicated by environmentally friendly circles. Additionally, the width from the lines involving the attack techniques and defenses suggests the chance from the attack route. Listed here, the lines are of equal https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network