Of Attack — Plan

Focusing on the highest-risk areas, such as choke points where multiple paths intersect.

Using attack trees or graphs to understand potential attack scenarios and the "how-to" of an exploit. plan of attack

Identifying critical assets, mapping the attack surface, and discovering vulnerabilities. Focusing on the highest-risk areas, such as choke