Attack trees are based upon determination tree diagrams. The “root” or foundation of the tree represents the attacker’s aim. The branches and “leaves” of the attack tree stand for the means of reaching that intention. Attack trees reveal that attackers often have multiple ways to achieve their concentrate on. The https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network