Map network and its connections to show the dependencies between applications, data and network layers to highlight potential vulnerabilities
22