Doable defenses to interrupt this attack, which can be implemented to improve the safety amount of the system, are indicated by inexperienced circles. Also, the width of your strains between the attack steps and defenses indicates the probability with the attack route. Listed here, the traces are of equivalent width https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network