To exhibit enterpriseLang, two business process models of recognized authentic-earth cyber attacks are shown using an attack graph excerpted through the generic attack graph of enterpriseLang, which demonstrates the attack methods and defenses to the appropriate program model property, and how They can be affiliated. This operate aims to produce https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network