To display enterpriseLang, two business technique models of acknowledged real-earth cyber attacks are demonstrated applying an attack graph excerpted from the generic attack graph of enterpriseLang, which demonstrates the attack actions and defenses to the applicable technique model belongings, in addition to how They are really affiliated. Other transformative technologies—internet https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network