To reveal enterpriseLang, two enterprise technique models of recognized authentic-environment cyber attacks are demonstrated employing an attack graph excerpted through the generic attack graph of enterpriseLang, which displays the attack steps and defenses for the applicable technique model property, and how They may be related. Despite the fact that some https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network