To display enterpriseLang, two company process models of known real-world cyber attacks are demonstrated making use of an attack graph excerpted within the generic attack graph of enterpriseLang, which demonstrates the attack measures and defenses for the relevant procedure model assets, and also how They're affiliated. They waited for the https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network