The report also states that oblique losses which include reputational hurt and security updates are “substantially higher”. Spoofing identity: an attacker may perhaps obtain use of the procedure by pretending to become a certified procedure user. Attack trees are diagrams that depict attacks on a program in tree variety. The https://ieeexplore.ieee.org/document/9941250