0 A B D E I P R S T W Z
Ap As At

A visualization of the chain of vulnerabilities an attacker exploits to infiltrate an organization.