There are lots of ways to threat modeling. Selecting the ideal methodology begins using a deeper understanding of the whole process of menace modeling. Editor’s Decision content articles are based on tips by the scientific editors of MDPI journals from throughout the world. (two) The “info” for an attack phase https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network