Attack trees are based on conclusion tree diagrams. The “root” or foundation in the tree represents the attacker’s aim. The branches and “leaves” of your attack tree stand for the ways of achieving that intention. Attack trees reveal that attackers frequently have numerous approaches to reach their goal. The above https://linkingbookmark.com/story16920374/the-basic-principles-of-cyber-attack-model