Text this: Approach to making strategies for network security enhancement based on attack graphs