Broadly considered a danger-centric framework, PASTA employs an attacker-centric standpoint to make an asset-centric output in the form of danger enumeration and scoring. 3. Exploitation: Based upon any information and facts recognized in the previous stage, the cybercriminals get started an exploit against any weak spot present in the community https://ieeexplore.ieee.org/document/9941250