Achievable defenses to interrupt this attack, which can be implemented to improve the stability level of the procedure, are indicated by eco-friendly circles. In addition, the width of your strains involving the attack measures and defenses signifies the probability of your attack path. Below, the strains are of equal width https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network