To make it harder for adversaries to access person credentials, extra qualifications require for use. Software menace models use approach-movement diagrams, symbolizing the architectural perspective. Operational menace models are developed from an attacker standpoint depending on DFDs. This approach permits The combination of Broad into the Corporation's development and DevOps https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network