It’s hard to know wherever to start to deal with them all. It’s equally as challenging to know when to prevent. Threat modeling can assist. Start out by diagramming how data moves through the system, wherever it enters the method, how it is accessed and who can access it. Record https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network