Source enhancement: Involves attackers getting or thieving methods to make use of them to get a long term attack. So, They are going to be much more suspicious of spearphishing strategies. Observe that not all methods is often mitigated. To model software threats, Wide diagrams the risk towards the architecture https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network