In the situation of a posh program, attack trees might be designed for every element instead of for the whole system. Directors can Establish attack trees and utilize them to tell protection selections, to determine if the devices are at risk of an attack, and To guage a certain type https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network