In the situation of a fancy technique, attack trees may be developed for each part as opposed to for the whole procedure. Administrators can Develop attack trees and make use of them to tell protection choices, to find out whether or not the techniques are at risk of an attack, https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network