This Microsoft document from the early times of Redmond’s personal threat modeling movement goes into far more depth on how to Make your personal knowledge circulation diagram for your system or application. The root node — the topmost guardian inside the diagram — is the general aim from the attack. https://thesocialcircles.com/story2471770/not-known-details-about-cyber-attack-model