With this phase, we manually extract the information necessary for constructing enterpriseLang through the ATT&CK Matrix. We look at Each and every adversary technique as an attack stage that may be performed by adversaries to compromise procedure property. From the approach description, we find out how This method (attack phase) https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network