To really make it harder for adversaries to accessibility person credentials, added qualifications want to be used. To model a more difficult state of affairs through which an adversary brings together both of these strategies, Asset one and Asset 3 are indirectly involved, along with the attack steps and defenses https://ieeexplore.ieee.org/document/9941250