Contributions of various methods to enterpriseLang, And exactly how enterpriseLang is often virtually usable for company devices To reveal enterpriseLang, two business method models of identified true-environment cyber attacks are shown using an attack graph excerpted from the generic attack graph of enterpriseLang, which shows the attack steps and defenses https://ieeexplore.ieee.org/document/9941250