Fig. 6From: Overview and open issues on penetration testComparison between the models for PentestBack to article page