It’s hard to know where by to begin to handle all of them. It’s just as challenging to know when to stop. Danger modeling will help. Start by diagramming how information moves through the system, where by it enters the technique, the way it is accessed and who will obtain https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network