To display enterpriseLang, two enterprise technique models of known authentic-environment cyber attacks are shown making use of an attack graph excerpted through the generic attack graph of enterpriseLang, which displays the attack steps and defenses for that related method model belongings, and also how They can be connected. Start by https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network