It’s challenging to know the place to get started on to address all of them. It’s equally as not easy to know when to halt. Menace modeling can assist. Spoofing identity: an attacker could obtain access to the procedure by pretending being a certified method person. Frameworks such as https://ieeexplore.ieee.org/document/9941250