Agent
Attacker
Cloud Service Provider
Internet-based Attacker
Local Area Network Attacker
Local Attacker
Non-Person Entity
Open-source Developer
Organization
Person
Physical Attacker
Product Developer
Provider
Remote Attacker
Service Provider
Supply Chain Attacker
Trusted Administrator Attacker
Trusted Attacker
Trusted User Attacker
User
Vendor
Wireless Attacker