Research Article
Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution
Figure 5
Compromising central office zone. This is where the attacker’s attack is moved laterally and then compromised into the office host.