“…Attack Severity Six threat levels: Localised, Moderate, Substantial, Significant, Highly Significant and National Cyber Emergency [15] Access Type Physical, Cyber [16] Attack Type DoS, Probing, R2L, U2R [19][20][21][22][23][24][25] DoS, MitM, Brute Force [26,30] DoS, Replay, Deception [35,36] Active Eavesdropping, Scanning, Probing [44] Physical, Network, Software, Encryption…”