Of Attack — Plan
Focusing on the highest-risk areas, such as choke points where multiple paths intersect.
Using attack trees or graphs to understand potential attack scenarios and the "how-to" of an exploit. plan of attack
Identifying critical assets, mapping the attack surface, and discovering vulnerabilities. Focusing on the highest-risk areas, such as choke