This model underlies ThreatModeler, an automatic threat modeling platform that distinguishes amongst software and operational danger models. Extensive is created specially to integrate into workflows developed around the devops philosophy. Spoofing id: an attacker might achieve access to the system by pretending to get a certified program consumer. At https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network