In the case of a posh process, attack trees is usually developed for every part in lieu of for the whole technique. Administrators can Construct attack trees and make use of them to tell stability choices, to find out whether the systems are at risk of an attack, and To https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network