Denial of services: the attacker exhausts the methods needed to provide expert services to genuine people. This function aims to develop a threat modeling language for evaluating the cyber safety of company IT units. By making use of offered tools, the proposed language allows the simulation of attacks on its https://webookmarks.com/story2461429/the-2-minute-rule-for-cyber-attack-model