To display enterpriseLang, two business process models of known serious-entire world cyber attacks are demonstrated employing an attack graph excerpted with the generic attack graph of enterpriseLang, which reveals the attack ways and defenses with the suitable procedure model assets, in addition to how they are associated. Persona non Grata https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network