Research Article

Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution

Figure 5

Compromising central office zone. This is where the attacker’s attack is moved laterally and then compromised into the office host.