Here, the author is editing an attack scenario, known as a hacker action web. This web is composed of nodes and edges that allow a hacker to procede from one action to another based on factors such as the time it will take to perform an action and the network operation to be performed.