To exhibit enterpriseLang, two business procedure models of recognised serious-world cyber attacks are shown applying an attack graph excerpted through the generic attack graph of enterpriseLang, which reveals the attack methods and defenses to the pertinent program model belongings, and also how These are connected. This exercise shows the dependencies https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network