The data on belongings, associations, adversary procedures, and mitigations is extracted in the ATT&CK Matrix framework. The proposed language permits users to model business units in general and make attack graphs for process models. (hbox P ^ 2 )CySeMoL differs from MulVAL, k-Zero Day Basic safety, and the TVA tool https://cyberattackai35566.get-blogging.com/27162317/the-basic-principles-of-network-threat