In the situation of a fancy system, attack trees could be created for every part as an alternative to for The complete program. Administrators can Establish attack trees and use them to tell stability selections, to determine if the programs are liable to an attack, and To judge a particular https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network