In the situation of a complex method, attack trees may be built for every component in place of for the whole technique. Directors can Develop attack trees and make use of them to inform protection selections, to find out if the methods are at risk of an attack, and To https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network