In the situation of a complex procedure, attack trees may be created for every ingredient rather than for The entire system. Directors can Develop attack trees and rely on them to tell safety conclusions, to determine if the units are susceptible to an attack, and to evaluate a particular form https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network