It’s challenging to know in which to start out to deal with them all. It’s equally as difficult to know when to halt. Threat modeling might help. Get started by diagramming how facts moves through the method, in which it enters the method, how it is accessed and who can https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network