This Microsoft document within the early days of Redmond’s have menace modeling movement goes into far more depth on how to Establish your own private data move diagram for the method or software. The basis node — the topmost mother or father during the diagram — is the overall intention https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network