There are various techniques to threat modeling. Selecting the proper methodology starts that has a deeper comprehension of the process of danger modeling. As of now We've detailed understanding of how the cyber-attacks materialize and which stage they progress, and as stated earlier if any obstruction or adversary takes place https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network