Contrary to a number of other cybersecurity frameworks, the Diamond Model closely focuses on the process of attribution: pinpointing those responsible for a cyber incident. Start off by diagramming how knowledge moves throughout the procedure, wherever it enters the procedure, the way it is accessed and who can obtain it. https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network