To exhibit enterpriseLang, two business technique models of acknowledged real-environment cyber attacks are shown applying an attack graph excerpted in the generic attack graph of enterpriseLang, which demonstrates the attack actions and defenses for your applicable process model belongings, and how They can be associated. Other transformative systems—internet of factors, https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network