Threat modeling can be a structured method by which IT execs can identify potential safety threats and vulnerabilities, quantify the seriousness of every, and prioritize approaches to mitigate attack and shield IT methods. Define the technical scope on the natural environment as well as the dependencies between the infrastructure https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network