Attack trees are diagrams that depict attacks with a technique in tree variety. The tree root may be the purpose with the attack, as well as leaves are ways to obtain that goal. Each individual goal is represented as being a independent tree. Thus, the technique risk Evaluation makes a https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network