In the case of a fancy method, attack trees can be designed for each part rather than for The full process. Directors can build attack trees and make use of them to inform protection decisions, to ascertain whether or not the methods are vulnerable to an attack, and to evaluate https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network