A further very best exercise, is not to look at apps and programs in isolation from each other. “If the varied threat models are linked to one another in exactly the same way in which the programs and components interact as part of the IT method,” writes Michael Santarcangelo, https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network