Attack Trees: https://learning.oreilly.com/library/view/threat-modeling-designing/9781118810057/9781118810057c04.xhtml#c04_level1_1 Attack Libraries (CAPEC and OWASP Top Ten attack libraries): https://learning.oreilly.com/library/view/threat-modeling-designing/9781118810057/9781118810057c05.xhtml Attack trees are an essential method for threat assessment. It evaluates the security of a system from an attacker perspective. The root node represents the attacks’ goal,