Probable defenses to interrupt this attack, that may be carried out to boost the safety volume of the method, are indicated by inexperienced circles. In addition, the width of your strains among the attack actions and defenses implies the probability from the attack path. Right here, the strains are of https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network