Model of attacker

In the case of cyber attacks