Well, thats a semi-tall order. Theres no magical diagram out there right now. Closest thing I could point you to would be bugtraq
As far as other things like this attack is mitigated by that....due to the open ended nature of pretty much anything being fair game to being a victim of being exploited that too might not be around.
Do you do risk assessments for management or something? Whats your target audience because it sounds like management in which case you only need the internet cloud with a line to the bad hacker computer and the line to your network. Save you some time.
Oh and if you are in the "paper, pencil pusher" section of a security department please dont use mitagatory ever again. Ever.