Cyber attack example

Cyberattack in process