Software package helps supply a framework for running the whole process of risk modeling and the info it creates. It might also help with possibility and vulnerability assessment and counsel remediation. Nevertheless, these steps will not be enough to avoid Attackers from reaching transmittedDataManipulation since just blocking the First attack https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network