0 A B D E I R S T W Z
Ap As At

A visualization of the chain of vulnerabilities an attacker exploits to infiltrate an organization.