PnG may help visualize threats through the counterpart side, that may be useful within the early levels in the threat modeling. The idea should be to introduce a technical expert to a potential attacker in the process and look at the attacker's competencies, motivations, and goals. Spoofing id: an attacker https://hotbookmarkings.com/story17073080/cyber-attack-model-options