It’s difficult to know where to start to handle all of them. It’s equally as hard to know when to prevent. Menace modeling can assist. Spoofing identification: an attacker might obtain usage of the method by pretending to be a certified program consumer. This understanding foundation may be used like https://ieeexplore.ieee.org/document/9941250