Threat modeling can be a structured course of action by which IT pros can establish likely stability threats and vulnerabilities, quantify the seriousness of each and every, and prioritize strategies to mitigate attack and protect IT resources. We are interested in acquiring this hybrid approach and piloting it with https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network