Feasible defenses to interrupt this attack, that may be executed to improve the protection standard of the method, are indicated by inexperienced circles. In addition, the width of the lines between the attack actions and defenses suggests the chance of your attack route. Below, the traces are of equivalent width https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network