The diagram in Figure one illustrates the stream of information by way of a web-based banking software; the dashed traces depict the trust boundaries, wherever facts may be perhaps altered and stability actions should be taken. We are interested in building this hybrid technique and piloting it with businesses https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network