To reveal enterpriseLang, two organization procedure models of recognised actual-globe cyber attacks are shown making use of an attack graph excerpted from the generic attack graph of enterpriseLang, which shows the attack methods and defenses with the pertinent system model assets, in addition to how they are involved. Although some https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network