The diagram in Figure 1 illustrates the movement of information as a result of a web-based banking software; the dashed lines represent the rely on boundaries, the place knowledge can be most likely altered and stability steps must be taken. We have an interest in creating this hybrid solution https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network