Research Article

Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution

Figure 8

Compromising DSO engineering control subnet. This is where the attacker compromises the control subnet through attack paths.