Doable defenses to interrupt this attack, which can be applied to increase the safety amount of the method, are indicated by eco-friendly circles. Additionally, the width of your traces between the attack actions and defenses signifies the probability with the attack route. Right here, the traces are of equal width https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network