Resource enhancement: Will involve attackers paying for or stealing sources to utilize them for the long term attack. The foundation node — the topmost dad or mum from the diagram — is the general target on the attack. With the attack tree, danger modelers can see what list of situation https://bookmarksurl.com/story2365841/how-much-you-need-to-expect-you-ll-pay-for-a-good-cyber-attack-model