Attack trees are based upon conclusion tree diagrams. The “root” or foundation of your tree signifies the attacker’s intention. The branches and “leaves” from the attack tree characterize the ways of achieving that intention. Attack trees display that attackers often have various approaches to succeed in their goal. Persona non https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network